Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested
Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
10 Hot Hadoop Startups to Watch

How you get tracked on the 'Net: Part One

Jim Reavis
Network World on Security, 11/03/99

We currently seem to be in the midst of a Privacy Explosion. The concerns over Web site practices, technology developments and government policies are leading to both a rapid escalation in activism by privacy-rights advocates and a slew of new market entries into the privacy business. Before you go into a state of privacy apoplexy, it is important to understand the many different ways that you are and can be tracked on the Internet.

MAC address. The media access control address is the unique number burned into your network interface card. Guaranteed uniqueness is something highly desired by computer programmers. By having a value that they know will be unique and unchanged on every machine, they can use this value to simplify programming tasks. Microsoft was under the gun earlier this year for using a PC's MAC address to identify the owner of Microsoft Office documents. Although pilloried for this and forced to change the code to prevent this type of identification, it should be noted that this MAC address feature was partially responsible for apprehending Melissa Virus creator David Smith.

The MAC address can also be used to auto configure the machine's networking protocol address. Novell IPX, for example, has used the MAC address concatenated with the network segment's address for a very long time. The next generation of TCP/IP, IPv6, also has the capability to use the MAC address as a portion of the TCP/IP address. The main reason for using the MAC address as a portion of the protocol address is for ease of management. However, the side effect of this capability is an audit trail that can be difficult to avoid. Tying the MAC address to TCP/IP exponentially increases the ability to track a machine's activity, as the TCP/IP addressed is logged all over the Internet.

IP Logging. A station's IP address can be captured at several different places on the Internet. Web Server log files can be a rich source of information about the user that is browsing the site. Among the pieces of data that can be discovered are browser type and version, operating system type and version, length of visit, pages requested, and even the previous site you were at (known as the referring site).

Beyond Web Server logging, your IP address can also be captured within firewall log files. While Web server log files will provide information about legitimate access to Web pages, a firewall will also capture any attempted access that may be illegitimate, such as port scan attempts from your machine. While we all want strong logging to help stop bad guys and act as a deterrent, many types of attacks can be proxied through a third-party machine, such as your own. Being caught in the middle of an investigation into a hack attempt can happen to you.

ISPs will also regularly log the IP address assigned to you, and when you log on, as part of RADIUS authentication systems. These systems have often been used for billing systems, but the information is often retained even when you have a flat fee service agreement.

Getting more information from captured IP addresses. Once someone has your IP address, it can yield additional information about you from a query to one of the network address registries. By using the whois command, one can tell which company or organization owns your address:

whois would be replaced by the specific IP address you are checking. can be replaced by for European addresses and for Asia/Pacific addresses. These queries typically include information such as your company's mailing address and the network administrator's contact information.

It is also possible to uncover information about your IP address from DNS. By using the traceroute command, one can trace the routing path taken from their node to yours, and might be able to learn the geographic location you dialed in from. For ease of management, ISPs like to use DNS to assign a geographic location to the IP addresses of their equipment, often down to the city. So even if you get a different IP address each time, your address may be traced to your ISP and the location you dialed into. While that may not necessarily mean you are in the same city, you are not often likely to purposely dial long distance when a local call will suffice.

When you surf the Internet, think of your PC as a slug leaving a slime trail wherever it goes. Combining the information above with any optional registration data you fill out at a Web site could leave your personal information fairly well exposed. Next week, in part two of this series, we'll take a look at some of the emerging options to hide your personal information.


Jim Reavis, the founder of, is an analyst with over 10 years' experience consulting with Fortune 500 organizations on networking and security-related technology projects. is a Web site dedicated to providing IT professionals with comprehensive information about network security issues. Jim can be reached at

It's easier than ever to spy on workers
Network World, 09/24/99

New Web tool tracks online shoppers
Network World, 09/20/99

U.S. lawmakers hear range of 'Net privacy opinion
Network World, 07/13/99

Archive of Network World on Security newsletters

Network World Security Alert will keep you up to date on the latest security holes and patches, with daily updates from key vendors, security organizations and Network World reporters. See the latest dispatches from the security here.

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.