Skip to main content

HOW TO SEE INCOGNITO HISTORY AND DELETE IT

We have heard about private or incognito browsing. It’s the mode that doesn’t store anything in history. While it does store cookies, but are deleted after the session is exited.

This mode is known as Incognito browsing in Google Chrome, Private Browsing in Mozilla Firefox, and InPrivate Browsing in Internet Explorer. Whatever we may want to call it, the mode works the same in all browsers.

However, sometimes we might want to go back to a page that you previously opened.

The question is – can you check your incognito history?

Problem is, there is no easy way to go back to that page. So all are search queries we saw is effectively lost. Unless you can Google it up and it shows again. But if it’s not there on the first page of Google, it’s gone forever.

But we can still get to know about the websites that have been browsed under the incognito mode.

Yes, the private browsing mode has a loophole. You can see the browsing history of someone using incognito mode but only if you have access to their computer. Also, they must be using the Windows operating system.

How to See Incognito History

While incognito can protect you from most prying eyes, it won’t be able to protect you if someone went snooping into your DNS queries. Since these DNS queries are stored and can be accessed on a Windows device, you can find out a user’s browsing session’s details.

How DNS Works:

A DNS server, or Domain Name System server, is a device that records the IP address and their hostnames. So when we enter the name of a website in the browser, the browser will check the DNS server and get the IP address of the site to open it.This entire process of communication between the browser and the DNS server gets recorded on your device – even if we’ve used private browsing. Now if we read the DNS results, it will show the browsing history of your computer. And it’s pretty simple to see the DNS results – we don’t have to be a hacker for this. 

How to test this:

Open a website using incognito mode. Check the history and you’ll see it’s not present in the history list of the browser.

  1. Now click on the Windows icon given on the bottom left corner.

      2.Look for the command prompt. You can invoke it by typing cmd.  Type ipconfig/displaydns>any location\filename

      3.   For example, let’s say you want to save the results in a text file called kingpin123.txt in D: drive.

      4.Type ipconfig/displaydns>D:\kingpin123.txt  .Go to the D: drive and you’ll see kingpin123.txt there. Open it and it will show the website you recently opened that didn’t show up in history.

 

How to Delete Incognito History

1.    Follow the same steps as above. Open the Command prompt and run it as administrator.

2.    In the command prompt, type ipconfig/flushdns

3.    This will flush all the DNS entries made in the incognito mode.

 

Comments

Popular posts from this blog

ROBOTIC PROCESS AUTOMATION

                             ROBOTIC PROCESS AUTOMATION: Robotic process automation (RPA), also known as software robotics, uses automation technology to simulate back-office functions performed by human employees, such as extracting data, filling out forms, moving files, etc. To integrate and carry out repetitive operations between enterprise and productivity applications, it mixes APIs and user interface (UI) interactions.   WORKING: RPA is not a physical robot but software running on physical and virtual machines. RPA is used when we have to handle repetitive tasks like sometimes, we fill in the same information at different places. It is operated by running a set of workflow tasks. It gives some instructions about what to do and how to do it at different stages of the workflow. Once the task is requested, the software runs and completes the whole task accordingly as many times as we want. If there is any incorrect data in bots, the software will send a request for correct

Unhackable Internet

  W hy it matters?   The internet is increasingly vulnerable to hacking; a quantum one would be unhackable. Quantum Computing    A quantum internet could be used to send unhackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a the quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss.   Now, Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information. The research is the missing link towards a practical quantum internet and a major step forward in the development of long-distance quantum networks.   The U.S Department of Energy (DoE) explains how a quantum link will make it happen through two quantum phenomenon: the first is quantum entanglement, where two-particle can become so inextricably li

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the