Chapter 5. Privacy

Privacy is likely to be a growing concern as Internet-based communications and commerce increase. Designers and operators of web sites who disregard the privacy of users do so at their own peril. Users of web services who are not concerned with privacy may soon find they have none. Users who feel that their privacy has been violated may leave the Web. Stories of problems may keep others away. Thus, it behooves everyone to pay attention to the task of protecting personal privacy on the Web.

Log Files

Every time a web browser views a page on the web, a record is kept in that web server’s log files.

Log files are under the control of the person or organization that controls the web server. They could be used against you in a court of law. They could be given to your employer to show what you do during the day when you’re being paid to work. They could be used by a jilted lover to spy on your activities. Worse things have happened. But most likely, the information will lay low, never raising its head. It might even be deleted . . . then again, it might not.

Each time a page is downloaded or a CGI script is run from a web server, the web server records the following information in its log files:

  • The name and IP address of the computer that made the connection

  • The time of the request

  • The URL that was requested

  • The time it took to download the file

  • The username of the person who downloaded the file, if HTTP authentication was used

  • Any errors that occurred

  • The previous web ...

Get Web Security and Commerce now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.