|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
Google practically owns search space. At least it used to own it before the current NSA-related backlash. But it has problems with tracking which links out of search results you chose to click. They are going to websites other then owned by Google so in no way it can retrieves information on which link you clicked.
But look at the links to the following pages all extracted from Google search pages:
Do you see anything special? There is a clever trick in all of them. Google search results will appear in a normal link. However, behind the scenes, redirect for tracking is embedded and it can then "travel" to the site that used particular link in the webpage, like in cases above. This is a part of larger problem: continues tracking your activities on the Web by "cloud services" providers,. See The SSD Project EFF Surveillance Self-Defense Project
There is actually several Trojans that reused this trick
Here is much more annoying example of such "hidden tracking" from Jason Ditz article White House Defends NSA ‘Social Mapping’ of Americans (September 30, 2013, Antiwar.com). The offending link with imbedded tracking is in red bold. The second link is "normal":
So when the New York Times revealed over the weekend that the NSA has for the past 3 years been using its wholesale data collection from American citizens to construct elaborate maps of “social connections,” it was only a matter of time before the White House shrugged it off as perfectly legal and reasonable.
Although I was aware about this Google "feature" for a long time recently I swiped my site for such links and discovered almost a coupe of dozens "hidden redirects" that the site accidentally incorporates. For example:
./Security/intrusion_detection.shtml: <li><a target="_blank" href="http://www.google.com/url?sa=U&start=1&q=http://www.faqs.org/faqs/firewalls-faq/&e=42">Firewalls FAQ</a></li>
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=10&ved=0CC4QFjAJ&url=http%3A%2F%2Fwww.revsys.com%2Fwritings%2Fquicktips%2Fturn-off-selinux.html&ei=mw5uS--oCcXf8Qbsgfn1BQ&usg=AFQjCNHIU8hrcqoasRSjuVm6GCKUSkQaIQ&sig2=iraX_JIypRz5xdAsRxkanQ">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=2&ved=0CA0QFjAB&url=http%3A%2F%2Fsysdigg.blogspot.com%2F2008%2F01%2Fhow-to-disable-selinux-in-centos-5.html&ei=jRNuS-bWDZHp8Qaa_uz2BQ&usg=AFQjCNH_8U7u2GxeJnTaCEU9bkoWO-nDxQ&sig2=2tgyLdOFLed7x9Udl4SQDw">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=14&ved=0CBQQFjADOAo&url=http%3A%2F%2Fwww.cyberciti.biz%2Ffaq%2Fdisable-linux-firewall-under-centos-rhel-fedora%2F&ei=4BNuS9D8Bofd8QbsseX7BQ&usg=AFQjCNFIQDKdG931AbfM6Sp7B0ZPvsEsNA&sig2=QbeAMljbkhW3oqm9Kj1U_A">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=12&ved=0CAsQFjABOAo&url=http%3A%2F%2Ftweakandtune.blogspot.com%2F2009%2F03%2Fcentos-disable-selinux.html&ei=4BNuS9D8Bofd8QbsseX7BQ&usg=AFQjCNHf25XbLV8aYinQ_cmPaqXRIqZI_Q&sig2=1yBVR4mkVv5cIOqnqCdeFw">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=6&ved=0CCEQFjAF&url=http%3A%2F%2Fwww.electrictoolbox.com%2Fswitch-off-selinux-centos-5%2F&ei=jRNuS-bWDZHp8Qaa_uz2BQ&usg=AFQjCNGkADdZqCqn-PNHfqWyGkYq1W3Rqw&sig2=QI09yR-t92wrB0Jlv-GJng">
./About/buzz.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=nikolai bezroukov&source=web&cd=293&ved=0CDEQFjACOKIC&url=http://www.artur.pl/hack/ritlabs.ii.pl/dn/index.html&ei=ODmKT7v-DMuCrQfRsszEBA&usg=AFQjCNE5xSv5FCoQysbovbyYH2s20A4i5w">
./Access_control/Groups/user_private_groups.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=11&ved=0CCMQFjAAOAo&url=http://nixcraft.com/centos-rhel-fedora/17162-howto-disable-user-private-group-upg-scheme-enterprise-linux-5-x-6-x.html&ei=uIicTrn3H-Px0gGgjNnuBg&usg=AFQjCNHTVhJcX-0SWlEguzlBlAOrO2UbsQ">
./Access_control/Groups/user_private_groups.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=17&ved=0CFQQFjAGOAo&url=http://linux.about.com/cs/linux101/g/userprivategrou.htm&ei=uIicTrn3H-Px0gGgjNnuBg&usg=AFQjCNHcFAo_HDjykZb1q43aKnQ6q_Jryg">
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=4&ved=0CC0QFjAD&url=http://en.wikipedia.org/wiki/Setuid&ei=vBINTbb5DoOKlwffyrmpDA&usg=AFQjCNHzFhKLce6gFJC0a6K-EfENeDFTFg">setuid - Wikipedia, the free encyclopedia</a></li>
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CDsQFjAF&url=http://pas.spb.ru/net/puis/ch05_05.htm&ei=vBINTbb5DoOKlwffyrmpDA&usg=AFQjCNGhDqXcoR7oZKE1OulhxJEcgDWiYA">[Chapter 5] 5.5 SUID</a></li>
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=21&ved=0CBIQFjAAOBQ&url=http://docstore.mik.ua/orelly/unix3/upt/ch49_08.htm&ei=CxMNTZDBNcX7lwePzpWuDA&usg=AFQjCNF0t-mbCJHXZ_xPYI1L_NGXioXEAg">Care and Feeding of
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=32&ved=0CBcQFjABOB4&url=http://www.ibiblio.org/pub/linux/docs/LDP/linuxfocus/English/January1999/article77.html&ei=MRMNTbj2E4eglAf8n_G_Cw&usg=AFQjCNH3zxBO-0fbI40njJjM1BZaZu2A5A">UNIX Basics - File Access Permissions</a></li>
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=3&ved=0CCYQFjAC&url=http://tldp.org/HOWTO/Security-HOWTO/file-security.html&ei=mBMNTdqqLISglAfgupRJ&usg=AFQjCNHhERJgJE_PhweZibKPl_HA2AOxBg">Files and File system Security</a></li>
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=1&ved=0CCwQFjAA&url=http://en.wikipedia.org/wiki/AppArmor&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNF7PbWbXxGq-P0QSCNdbjkwGBdqPQ">
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=3&ved=0CDsQFjAC&url=https://help.ubuntu.com/community/AppArmor&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNEnwuHyjUIK6mjMTyRGhsfquS7uxA">
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=4&ved=0CEIQFjAD&url=http://wiki.apparmor.net/&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNEBuMgXuDAAPF3EVlvkM0RTtb3lqg">
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=5&ved=0CEkQFjAE&url=http://www.suse.com/support/security/apparmor/&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNHRcoqkedIIsPhUkFlo4vIwSgLJQg">
./Admin/Administration_of_remote_datacenter/administration_of_remote_servers.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=administeration or remote linux servers by boris loza, phd, cissp&source=web&cd=1&sqi=2&ved=0CCQQFjAA&url=http://www.laptopmobilesecurity.com/papers/RemoteServers.pdf&ei=Mhw5UJzbLIXJrAel64CICw&usg=AFQjCNEJaVPoIc0NZiLLh12HGfL1WhFxbA">
./Admin/HP_operations_manager/Migration_from_tivoli_tec/index.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CDcQFjAF&url=http://documents.bmc.com/products/documents/38/98/83898/83898.pdf&ei=suP6TPHfOYT6lwf_qqCgDA&usg=AFQjCNHYcJIjO8OAqVLm7RaXMYtmGRo9WQ">
./Admin/HP_operations_manager/Migration_from_tivoli_tec/index.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=10&ved=0CFIQFjAJ&url=http://pirean.com/Downloads/secure/TEC_to_Netcool_WEB.pdf&ei=suP6TPHfOYT6lwf_qqCgDA&usg=AFQjCNGuD1gqVDt5t9jxSLKyTglkCC-hTw">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=8&ved=0CEcQFjAH&url=http://www.softpanorama.org/Admin/HP_operations_manager/Reference/opcmon.shtml&ei=xmleUNL9J8XirAeDiIDIDg&usg=AFQjCNERr8omPsuOHfe5C7JrtirKnpwbOQ">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=9&ved=0CEwQFjAI&url=http://www.slideshare.net/hpsoftwaresolutions/tips-and-tricks-for-hp-operations-manager-including-how-to-successfully-migrate-from-unix-to-linux&ei=xmleUNL9J8XirAeDiIDIDg&usg=AFQjCNFaqDLlPp2MDY8otzhzZQ43xoXwZw">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=16&ved=0CDkQFjAFOAo&url=http://blue-elephant-systems.com/fileadmin/Documents/Whitepapers/doc_whitepaper_ReleaseManagementProcess_1.0.pdf&ei=9mpeUOC3KIWPrgeNz4CoCg&usg=AFQjCNH8E87JrR31JBmafEn2UO0kSnuRAw">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=17&ved=0CD4QFjAGOAo&url=http://h30499.www3.hp.com/t5/Systems-Management-OpenView-OP/HPOM-Monitoring-Threshold/td-p/5246892&ei=9mpeUOC3KIWPrgeNz4CoCg&usg=AFQjCNFdoHS5BOvN8K7bd63Xrx_VwJhHkA">
./Admin/HP_operations_manager/agents.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=11&ved=0CEYQFjAK&url=http://www.slideshare.net/hpsoftwaresolutions/tips-and-tricks-for-hp-operations-manager-including-how-to-successfully-migrate-from-unix-to-linux&rct=j&q=HP HPOM agent troubleshooing&ei=G5O0TLyNKsSAlAfp7azlCQ&usg=AFQjCNFaqDLlPp2MDY8otzhzZQ43xoXwZw">
./Admin/Tivoli/ITM/index.shtml: in 2004 (<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=1&ved=0CBYQFjAA&url=http://www-03.ibm.com/press/us/en/pressrelease/7160.wss&ei=kMhQTI6nIsGAlAef6pG8CQ&usg=AFQjCNEa7Co7sgEhWkffFHxRUH9k3nvkKA">IBM).</a> ./Admin/Tivoli/index.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=2&ved=0CB0QhgIwAQ&url=http://en.wikipedia.org/wiki/Samuel_J._Palmisano&ei=RstQTOehJ8G78gbZ8ZzODQ&usg=AFQjCNG4sfcLpmCsHqzArTFNicSpTED8Bg">
./Admin/Tivoli/tivoli_alternatives.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CDcQFjAF&url=http://documents.bmc.com/products/documents/38/98/83898/83898.pdf&ei=suP6TPHfOYT6lwf_qqCgDA&usg=AFQjCNHYcJIjO8OAqVLm7RaXMYtmGRo9WQ">
./Algorithms/Compilers/lexical_analysis.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=2&sqi=2&ved=0CC8QFjAB&url=http://dragonbook.stanford.edu/lecture-notes/Stanford-CS143/03-Lexical-Analysis.pdf&ei=Dv0YTbevD4L_8Abr5cyTDg&usg=AFQjCNGbpw3faB2XcO9AsmVU-ZrdLBTFQQ">
./Algorithms/Compilers/lexical_analysis.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=3&sqi=2&ved=0CDYQFjAC&url=http://www.cs.vassar.edu/~cs331/lectures/lexical-analysis.pdf&ei=Dv0YTbevD4L_8Abr5cyTDg&usg=AFQjCNGctbwIiaMZqrHlohY5ybwMvRJYyA">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=8&ved=0CE0QFjAH&url=http://blogs.msdn.com/b/ericwhite/archive/2010/07/30/building-a-simple-recursive-descent-parser.aspx&ei=m1YaTYGfIoG8lQePrszCCw&usg=AFQjCNHw9wvv96875D_GC3l0Ve5Lx5yYCQ">
./Algorithms/Compilers/recursive_descent_parsing.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=1&ved=0CBcQFjAA&url=http://en.wikipedia.org/wiki/Recursive_descent_parser&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNF3qsAXDUtjPOpLUUqpDD3uIL3bQA">
./Algorithms/Compilers/recursive_descent_parsing.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=1&ved=0CBkQFjAA&url=http://en.wikipedia.org/wiki/Terminal_and_nonterminal_symbols&ei=WFwaTaXgH8aqlAe93fzzCw&usg=AFQjCNHbNUbkSibyiY647ztpNwf9lxIEfw">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=2&ved=0CCMQFjAB&url=http://www.cs.uky.edu/~lewis/essays/compilers/rec-des.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNFNPS6GpKMM4Svz97w6Za1u13CDfQ">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=4&ved=0CDEQFjAD&url=http://www.codecodex.com/wiki/Recursive_descent_parsing&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNFwd4SlU8glerSwnAIZkx18Z73vAg">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CD8QFjAF&url=http://www.cs.utsa.edu/~wagner/CS3723/rdparse/rdparser.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNHa_k1hXqMdxlprWFSKNCU7i-gT7A">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=5&ved=0CDgQFjAE&url=http://math.hws.edu/javanotes/c9/s5.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNEaVGtImupj1gq5ZWIdjyPLoro_Qw">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=7&ved=0CEYQFjAG&url=http://lambda.uta.edu/cse5317/notes/node14.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNGIrFtJp4AUhKmK8pYx1ED0aYf_MA">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=8&ved=0CE0QFjAH&url=http://blogs.msdn.com/b/ericwhite/archive/2010/07/30/building-a-simple-recursive-descent-parser.aspx&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNHw9wvv96875D_GC3l0Ve5Lx5yYCQ">
./Algorithms/Sorting/bubblesort.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=94&ved=0CCUQFjADOFo&url=http://warp.povusers.org/grrr/bubblesort_misconceptions.html&ei=mS2xTOeRL4OglAfY45mmBg&usg=AFQjCNHYFl1O-d1rCA95M8JIcVCJXyWfTg">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=12&ved=0CCQQFjABOAo&url=http://www.sph.umich.edu/csg/abecasis/class/2006/615.08.pdf&ei=zea5ToLhO4PJrAeonOjaBg&usg=AFQjCNHpmVFzHj2NL6TqIqrt1Mdn6bcDTQ">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=22&ved=0CCMQtwIwATgU&url=http://www.youtube.com/watch?v=-kh9oFK8R7s&ei=yO65TqaVDoLJrQfZ883hCA&usg=AFQjCNHCyVxC5z-Z-1jJwcP_bU-lmsa_vg">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=25&ved=0CDoQFjAEOBQ&url=http://www.learnerstv.com/video/Free-video-Lecture-2233-Computers.htm&ei=yO65TqaVDoLJrQfZ883hCA&usg=AFQjCNE5urPyd87S2Kv9JERB1hUGvrBs6Q">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=12&ved=0CCQQFjABOAo&url=http://www.sph.umich.edu/csg/abecasis/class/2006/615.08.pdf&ei=zea5ToLhO4PJrAeonOjaBg&usg=AFQjCNHpmVFzHj2NL6TqIqrt1Mdn6bcDTQ">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=12&ved=0CBsQFjABOAo&url=http://www.dreamincode.net/forums/topic/103288-bit-tricks/&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNHr-NzGFqZZcgajiJy-7xEGS7W1Rg">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=11&ved=0CBIQFjAAOAo&url=http://ezinearticles.com/?String-Tricks---A-Bit-of-String-Magic-(Free-Magic-Trick)&id=990561&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNEqIGhHOcLQX4hmsx37q08GbwrjVg">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=14&ved=0CCkQFjADOAo&url=http://www.ugcs.caltech.edu/~wnoise/base2.html&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNEQhX7Dm5Xuy-TrXwxYUhCgSebj8Q">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=17&ved=0CD4QFjAGOAo&url=http://www.steike.com/code/bits/vertical-counter/&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNEZDEEBIoCv_DnQMJqWN_-U3Ht6ug">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=27&ved=0CDoQFjAGOBQ&url=http://ctips.pbworks.com/w/page/7277581/Bit-Manipulation&ei=uHoaTaHrHYSdlgfvnJnJDA&usg=AFQjCNEfAiIv8g0h0wMjuYYnNpCssk16OQ"> Bit ./Bookshelf/Classic/tmmm.shtml: <a target="_blank" href="http://www.google.com/url?sa=U&start=1&q=http://en.wikipedia.org/wiki/The_Mythical_Man-Month&e=747">
./Bookshelf/Classic/tmmm.shtml:<a target="_blank" href="http://www.google.com/url?sa=U&start=1&q=http://en.wikipedia.org/wiki/The_Mythical_Man-Month&e=747">
If you are using Firefox, you can protect yourself from this kind of tracking using one of the following two Firefox add-ons:
Google Search has the annoying habit of changing the result link when you click it. If you try to copy the link you get some gibberish instead of the actual link. This extension disables this behavior - on any Google domain, without having to configure anything. Simply install and enjoy!
This addon will remove such embedded tracking when click a link in Google Search and open a link directly.Features:
Remove tracking(redirect) Quickly(no contents rewrite) and Simple(rewrite tracking URL in HTTP request) on
and also remove tracking from Javascript dynamic generated URL.
- Google Search
- Google Custom Search (since version 1.3)
- Google Images (since version 1.3)
- Google Maps (since version 1.4)
- Google News (since version 1.5)
Remove tracking is performed in the following four patterns.
1. Left-click a link to open in that window.
2. Right-click on a link to open in a new tab.
3. Right-click on a link to open in a new window.
4. Copy a link and paste it into the URL bar.And remove tracking supports normal HTTP request and secure HTTP request (https).
For protect your privacy, I recommend you to use Google Search in secure HTTP request https://www.google.comKnown Issues:
Sometimes 'Left-click the link to open in that window' was failed.
In my trouble shoot, Network monitor captured tracking removed url only.
So I think Firfox failed to refresh window in some internal conditions.
If firefox failed to refresh window, please use other patterns.
In addition, this issue does not occur almost when using secure http request (https).Also "Remove Yahoo Tracking" is available.
Google uses a redirection link to tracks your clicks, in order to analyze the stats and later optimize their search results. This addon simply removes that redirection and turns every search result in its original link, saving your time and giving you more security.
Works on results accessed from http://google.com or https://google.com (and any country variation like google.es, google.co.uk and so on) and from the Firefox search box, works on regular results and Google Blogs, Google News, Google Recipes, Google Images, Google Videos and even using encrypted.google.com.
It also cleans up all the links you copy & paste from Google search results pages. This is one is a feature most users are looking for and other similar addons don't have.
Please give me feedback as much as you can and suggest features. I'll be maintaining and supporting this addon since it proved to be useful for the community. I'll be glad to hear from you.
You can also block Google Analytics, which is another backdoor using which Google tries to track your activities. See NO Google Analytics 0.5
|
Switchboard | ||||
Latest | |||||
Past week | |||||
Past month |
January 30, 2012 | CNET
The Electronic Frontier Foundation offers the Panopticlick service that rates the anonymity of your browser. The test shows you the identifiable information provided by your browser and generates a numerical rating that indicates how easy it would be to identify you based solely on your browser's fingerprint.
According the the entropy theory explained by Peter Eckersley on the EFF's DeepLinks blog, 33 bits of entropy are sufficient to identify a person. According to Eckersley, knowing a person's birth date and month (not year) and ZIP code gives you 32 bits of entropy. Also knowing the person's gender (50/50, so one bit of entropy) gets you to the identifiable threshold of 33 bits.
When I ran Panopticlick's test on a Mac Mini, it reported 20.89 bits of identifiable information, which according to the entropy formula would be insufficient to identify me. But maybe I want the sites I frequent to know a little bit about me. As I explained in a post from last October, personal information is the currency of the Web.
... ... ...
Free add-on for Firefox and Google Chrome targets tracking cookies
Several free browser extensions help you identify and block the companies that are tracking you on the Web. For example, Ghostery (available in versions for Firefox and Chrome) adds an icon to your browser toolbar showing the number of trackers on the current page. Click the icon to see a list of the trackers and view options for blocking or white-listing specific ones.
The free Disconnect extension (also available for Facebook and Chrome) takes a more direct approach to wiping your Web tracks. Disconnect blocks tracking by Google, Facebook, Twitter, Yahoo, and Digg. It also has an option for depersonalizing searches.
As with Ghostery, Disconnect places an icon in the browser toolbar that shows the number of elements it has blocked on the current page. Click the icon to open a window showing the number of trackers blocked for each service. To unblock tracking for one of the services, click its entry. (Note that I tested Disconnect only with Google; also, blocking of international Google domains is not yet available, according to Disconnect's developers.)
When I tested Disconnect, I had to sign in to Gmail, Google Docs, and other Google services every time I returned to or refreshed one of those pages, which is understandable considering that blocking the cookie prevents Google from keeping you signed in. Otherwise I was able to use Google services without a problem, including search, viewing and sending Gmail, and accessing, creating, uploading, and downloading Google Docs files.
While people are rightly concerned about who is watching and recording their Web activities, at least Google makes it possible to use the company's services without being too forthcoming with your personal information. ISPs and other Web services do as much tracking as Google--or more--but garner far fewer headlines. For a detailed look at the state of privacy in the digital world, read about the Electronic Frontier Foundation's Surveillance Self-Defense project.
After all, the true threat to privacy is from the trackers we don't know about, and who aren't household names.
Whenever you click a link in Google Search, your click is redirected through a secret URL. If the site you're going to is http://www.cybernetnews.com/, Google will do a secret redirect through a URL that looks similar to http://www.google.com/url?url=http://www.cybernetnews.com/. In some cases, you can reveal the secret redirect by right-clicking on a linked search result. If that doesn't work, your last resort is an HTTP sniffer.
There are several Firefox add-ons that claim to get rid of Google Search's click tracking. CustomizeGoogle is one of them. Among other tweaks, it promises to remove click tracking and disable Google Analytics cookies. If you just want the anti-tracking feature without the bells and whistles, there's a Greasemonkey script you can download called Google Tracking B-Gone. To use Greasemonkey scripts, you need to install the Greasemonkey add-on for Firefox. Also, if you use an international version of Google such as google.co.uk, you have to change the script's URL range from http://*.google.com/* to http://*.google.*/* to ensure that the script is allowed to operate on your local Google site.
Google Project Hosting
When searching using google, the result links don't go directly to the site - they first send the user to an interim "redirecting" page, which they use to keep track of user's search results.Usually, this isn't a problem, but sometimes when you're on a slow connection, or want to send friends a link straight from the search results, this just gets in the way.
Undirect is a simple chrome extension that removes this tracking and redirection from google search results.
Works for all google domains across all countries, and is very light-weight.
April 22, 2011 | GhacksMany websites look up the IP address that you are connecting with, or other browser header information, to redirect you automatically to a language specific website. While those systems usually get it right, they are annoying for users who do not want to be redirected to a country specific domain name or different language version.
The search engine Google is for instance redirecting first time users automatically to a localized search engine when they open google.com but do not have an IP address that resolves to the US. You can click on the go to google.com link at the bottom to force the switch but this is saved in a cookie which means that you will be redirected again if you delete the cookie or if it expires. Some users do not like to be patronized.
Back in 2008 I posted a solution to the question Why is Google.com redirecting me to another Google domain?. The solution back then was to use a special url to load google.com without being redirect to a country specific search domain.
The url http://www.google.com/webhp still works as intended. Roman send me an email recently that described a second option which blocks the redirect completely and loads the standard Google search engine homepage.
If you load http://www.google.com/ncr you tell Google that you do not want to be redirected. The NCR supposedly stands for No Country Redirect.
Now, if you bookmark that domain name you will always end up on the default google.com search page. Google will automatically save a cookie on your computer that prevents redirects to other localized Google search engine domains. You can theoretically open google.com directly after this point as long as you keep the cookie on the system. If you want to avoid troubles at all, you may want to always use the ncr address.
It is not an ideal solution, considering that you cannot seem to use http://www.google.com/ncr as your browser's search engine for instance, but it works reasonably well if you bookmark the url and use that bookmark to open the Google search website.
Tutorial stop Google redirecting to local search results Neorelic [The Blog] by Patrick Jones
November 23, 2011 | blog.neorelic.com.auRecently, I've been hearing a few complaints about Google automatically redirecting to location-specific search results. Most of the time, this is fine. However, sometimes you might find this to be too restrictive and want to expand your search outside of your own country.
Here are a couple of quick tips on how to get around Google's automatic redirection.
>Use google.com/ncr instead of google.com
How to Stop Google from recording your Search habits
AOL, the fourth most popular search engine, recently released search queries of 650,000 AOL subscribers on the Internet. Though AOL now says that it was a mistake and quickly removed the search data from their website, mirror copies of AOL search terms continue to be available across the web.It is a universal truth that all search engines, including Yahoo, Google and MSN, retain search data of their users which can easily give a clue about the person's identity and a glimpse into his mind and online activity.
Though it is highly unlikely that Google users will ever come across this "AOL Data Spill" like embarrassing situation, the possibility cannot be ruled out completely especially after Eric Schmidt's remark that ".. this sort of thing would not happen at Google although you can never say never."
If you are worried that some day Google, by mistake, might disclose your private search terms into public internet domain, try some of the following suggestion that may fool the search engine or give it a hard time recognizing you.
The background is that when you perform a search on Google, the site search logs keep a record of your computer IP address, cookie ID and the search query terms. Google may also track your clicks on the search results by rewriting the destination URL. So we will look at possible ways to manipulate each of this information:
1. Disallow Google to Store Cookies - The important thing is that it doesn't suffice blocking cookies from just google.com domain, you must also block cookies from google site in your country.
For example, in India, one would block google.com and google.co.in - This is because Google redirects you to your local country page when you type in google.com in the browser address bar.
To block cookies, open the Cookie blocking dialog in your browser, type the site url and click disallow or block.
IE: Click Tools->Internet Options->Privacy->Sites
Firefox: Click Tool->Options->Privacy->Cookies->ExceptionsRemember that Google Personalized Search History won't work after you disable cookies from Google.com. Also, you may have to type the user name and password of other Google services like each time you have to login since cookies are disabled and you won't be automatically logged in.
2. Use Scandoo - Scandoo is a wonderful wrapper written around search engines that warns you of malicious websites in search results. Now the good part is that Scandoo can help you search Google, Yahoo or MSN without disclosing your actual geographic location (or IP Address) to the search engine.
Scandoo interace remains invisible to the end user and one would feel that he is searching via Google itself. [Scandoo Google, Scandoo IE Toolbar]
3. Download HideMyIp software - Your IP address is one big link between your search queries. You would be lucky if your ISP provides you a dynamic IP address that changes frequently but if you are stuck with a static IP, you can still hide it with Hide MyIP address software.
HideMyIP conceals your real IP address and shows a fake IP with a hostname to the sites that you visit. You can set Hide-My-IP to change your IP address every minute. [Download Hide-My-IP.com]
4. Download CustomizeGoogle for Firefox - If you Google using Firefox, this is a highly recommended extension that completely enhances your Googling experience. It can help remove Googel Ads, anonymize your Google userid, remove click tracking or filter google search results. [Install CutomizeGoogle]
5. Block cookies from Yahoo, Google and MSN. Then use Dogpile.com for searching these three search engines simultaneously. [Dogpile Search]
6. Block Google from Tracking Your Clicks
7. Don't use Google or Yahoo to search the web as they will store your entire trail of activity on their servers. Try Clusty.com or Ixquick.com which do not save users search data. Clusty is a meta search engine based on Vivisimo clustered search - It queries several top search engines, combines the results, and generates an ordered list based on comparative ranking.
8. Finally, you can try Scroogle Google Scraper, a search wrapper around Google (and yahoo) search that lets you anonymously search Google and promises not maintaining your search query terms. [Google Scroogle]
By typing "/ncr" at the end of the URL, this indicates that you don't want to be automatically redirected to your localised version of Google. This also works if you want to specifically direct your browser to any other localised version of Google from around the world. For example:
- will take you to the Australian site
- will take you to the UK site
- http://www.google.ca/ncr will take you to the Canadian site
Google matched content |
Automatic redirection to location-specific serach results
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March, 12, 2019