Each time a client requests a web page, the server can identify the IP address of the request and usually logs. Also, unless you do not put, most web browser files requested web pages in a feature of the visible history, and often in large cache of content locally. Unless your browser’s communication server uses HTTPS encryption, web requests and responses that travel in clear on the Internet and can be viewed, stored, and cached by intermediate systems. When a web page requires, and user supplies, personal information such as their name, address, e-mail address, etc.-based web entities can associate the actual web traffic with that person. If your site uses HTTP cookies, authentication username and password, or other monitoring techniques, you can report to other web visits before and after the provided identifiable information. This way it is possible for a web-based organization to develop and build a profile of individual people using your site or sites. It may be able to build a record for just one that includes information about their leisure activities, their business interests, their profession, and other aspects of their demographic profile. These profiles are obviously of potential interest for business sales, advertisers and others. According to the terms and conditions of the site and the local laws that apply the information from these profiles can be sold, shared, or transmitted to other organizations without the user being informed. For many ordinary people, this means a little more than a few unexpected e-mails in their inbox, or a bit of “mysteriously relevant advertising on a future page. For others, this may mean that time spent engaging in unusual interest can result in a more targeted marketing flood that may be unwelcome. Law enforcement, counterterrorism and intelligence can also identify, target and track individuals according to their interests or trends on the web.
Social networks try to get users to use their real names, interests and positions, rather than pseudonyms. These leaders believe that this makes the social networking experience more appealing to users. On the other hand, photographs or unsecured loaded statements can be identified to an individual, he may regret this exposure. Employers, schools, parents and other loved ones may be affected by aspects of social networking profiles, such as text messages or digital photos, that individual posting does not intend these hearings. Online bullies may use personal information to harass or persecute users. Modern social networking sites allow for accurate control of privacy settings for individual stations, but these can be complex and not easy to find or use, especially for beginners. Photographs and videos posted on websites have caused particular problems because they can add a person’s face to an online profile. With modern and potential facial recognition technology, it may be possible to connect this face with previously anonymous, images, events and scenarios that have been imaged elsewhere. Because of the cached image, mirroring and copying, it is difficult to remove an image from the World Wide Web.