There are two basic types of tools he may have used to identify you as a visitor. He could have had a Web-based...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
tool like Google Analytics or tools he installed on his website, like the open source AWStats or the commercial WebTrends. He could have also manually looked up your organization's IP space and searched for it in his logs.
There are a couple different ways for your employees to surf the Web anonymously, depending on the technical sophistication of your end users and your specific needs. You can either implement a Web proxy for anonymous Web browsing, like those at Anonymizer.com or an anonymity network like Tor. Both types of tools need to be configured on your local computers for maximum effectiveness in case you have mobile computers. If all of your computers access the Internet through your local network, you could also configure a local Web proxy on your network and then tunnel this proxy though an anonymous proxy service
Dig Deeper on Web Browser Security
Related Q&A from Nick Lewis
When it comes to state-sponsored attacks infecting mobile devices, do users have any chance of tracing the attack? Expert Nick Lewis offers some ...continue reading
Microsoft won't patch certain ASLR bypass flaws, but enterprises still need to protect against them. Expert Nick Lewis explains the threat and how to...continue reading
Threat actors in China are using VPN services to hide and anonymize their attacks. Expert Nick Lewis explains how to get a handle on these ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.