Windows features are automatically recorded for ease of use. However, some of these features expose our "whereabouts". What should we do at this time? Please refer to the eight methods described in this article, so that your computer has no trace.
1. Permanently delete the file
First, we should clear the files that you think are definitely not needed from the system. Here we refer to all the junk files that you discard to the recycle bin. Of course, you can also clear the recycle bin whenever you think of it (double-click the recycle bin icon, select the "file" menu, and then select the "Clear Recycle Bin (B)" command ), but the better way is to disable the recycle bin function. To permanently delete a file, right-click the recycle bin icon, select "properties", go to the "Global" tab, and select "All Drives use the same settings (U ):", in addition, the check box "Do not move the file into the recycle bin, but completely delete (R)" is marked with the selected tag.
This step prevents deleted files from hiding in the recycle bin.
2. Do not leave any clues about the deleted files
Even if you cannot directly view the document content, you can view the files you have recently used in Microsoft Word or Excel to learn about your work. This temporary list even lists the files that have been recently deleted by you, so it is best to disable this function. In Word or Excel, select the "Tools" menu, select the "options" menu item, and go to the "General" tab, in general options, deselect the check box before "list recently used files (R.
This step removes traces of recently deleted files. To this end, clear the file list in the File menu in Word, Excel, and other common applications.
3. Hide document content
Trace of the documents we are currently using should be hidden. Open the "Start" menu and select the "document" menu item. The list lists about 15 files you have recently used. This allows others to easily browse your work files or personal files without searching your hard disk. To hide your work, clear the list. To this end, you can click the "Settings" menu item in the "Start" menu, select "Taskbar and Start Menu", go to the "Taskbar and Start Menu", and then select the "advanced" tab, click the clear (C) button in the tab.
In this step, clear the files contained in the "document" menu item in the Windows "start" menu and hide these files.
4. Clear temporary files
Microsoft Word and other applications usually save your work results temporarily to prevent unexpected losses. Even if you do not save the files that are being processed, many programs will save the text that has been deleted, moved, and copied by you. Temporary files stored by various applications in the WINDOWSTEMP folder should be regularly deleted to clear the scattered text. You should also delete all the corresponding files in its subdirectories (such as the FAX and WORDXX Directories. Although many files have the extension TMP, they are actually complete DOC files, HTML files, and even image files.
This step clears temporary files and useless files on the hard disk.
5. protect important files
Password protection for important files, which is easily implemented in Word and Excel. Select "file" and "Save as", select "general options" in "Tools", and enter the password in "Open permission password" and "Modify permission password, it is best not to use real words and dates as passwords. You can mix letters, numbers, and punctuation marks to make the passwords difficult to crack. Of course, you must enter a password whenever you open or modify the document.
This step adds a lock to an important file.
6. Rewrite the webpage Access History
The browser is another part to be protected. Currently, most users use Internet Explorer as the web browser to access the Internet because Microsoft's Windows system is installed. Internet Explorer lists all accessed objects, including browsed webpages, queried objects, and input data. Internet Explorer saves the webpage access history in folders by week or by URL. We can delete each "URL" individually, but the fastest way is to delete the entire folder. To clear all history records, select Internet options from the Tools menu, select the General tab, and click the Clear history button.
This step clears the browser history.
7. Enter the website address but not recorded
Internet Explorer records each URL you enter in your browser. Verify that you enter a URL in the address window below the toolbar. the browser will record the URL in the drop-down menu, until another project has replaced it. You can access the website through the following method, and the website you use will not be recorded: you can press Ctrl-O in the browser, and then enter the URL address in the dialog box.
In this step, the accessed URLs are not recorded.
8. clear information in the cache
Internet Explorer caches the web pages you recently visited on the hard disk. When you access these web pages again, the cache information can speed up the access to the web page, but it also reveals your secret to the hacker. To clear information in the cache, in Internet Explorer, select "Internet Options" in the "Tools" menu, go to the "General" tab, and click "delete file.