ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How To Use A Public PC Safely And Leave No Traces Behind

Updated on February 19, 2013

Nowadays, many places offer computers with network connection for the public; as a result, using a public PC to surf the net, check e-mails, perform bank transactions and other kinds of user actions can be as easy as a login.
Most hotels, airports, large malls and stores, libraries and of course internet cafes (which will charge you) include a spot through which you can access a computer for your needs.
Most computer users have, at one point or another, used a publicly available PC - the practice is therefore very common. However, what is also common, is others taking advantage of it, by attempting to reach your personal private details. Whenever you use a public computer, you could leave traces behind, enough that could create a large risk for you - for example, a careless bank transaction through e-banking would leave the next user with enough information about your financial status, or even worse, would allow them to perform transactions on your behalf.

Tips to keep you relatively safe

The risk involved with the usage of a public PC cannot however overcome the convenience of it; sometimes we just can't avoid using it, due to emergency or other reasons. Since we sometimes cannot do without it, I have compiled a guide showing what a user should be particularly careful with.
The list of tips shown here, if followed, can offer safer PC usage and less concerns for you.

1. We always keep an eye around for suspicious behaviors, such as people who might seem too eager to check what you are doing. They would probably try to combine what they see at your monitor and what you seem to be typing. You do not have to look around you like a paranoid person - but when you are typing your login credentials, you better do it. Better safe than sorry, right?
2. I would largely discourage any person who wants to perform a bank transactions from a computer available to the public. The risk is just too high to the point that it is always preferable to postpone the transaction until we can use a computer that belongs to us or someone we can trust. Buying something using a credit card is also, technically, a bank
transaction, so anyone should also avoid doing it at all costs. If you are in extreme emergency and cannot avoid it,
keep reading about the other tips so you can decrease the chances of someone getting access for fraudulent purposes.
3. You should be very careful with any page that requires a log-in; make sure you always logout your account before
leaving the PC. Additionally, you could opt for specific characteristics in some browsers that offer higher chance of
safety by not saving any forms you have typed and not keeping any kind of history. If you are using Firefox, this
particular feature is called Private Surfing (Ctrl+Shift+P). If you do not want or cannot try it, make sure you never
let the system save your typed forms or remember your login and password details.
4. If you have to let the PC unattended for some time (for example, if you need to visit the restrooms), close all open
programs. Do not simply minimize their windows.
5. Be cautious at all times - think of all other people who had used the particular computer before you. You cannot be
sure on what sites they visited, what files they downloaded, etc. If you need to bring a file with you, such as with a
USB flash drive, make sure you scan it first for viruses from the security applications installed in that PC (if you
aren't sure how they work, a good chance is that there is option to scan your files if you right click on it). When you
are ready to use the files, later at your own computer, scan the USB again. You can't be sure that the antivirus program of the public computer was updated or trustworthy enough - you wouldn't like to risk your own system by bringing a nice set of viruses and spyware with you back home.
6. Before you leave the public computer you need to eliminate all traces of your usage. Logout all of your accounts,
close all your internet tabs and all other programs. Delete the browsing history (in Firefox, click Ctrl+Shift+Del) and
eventually close the internet browser too.

In general, try to remember all programs you had opened so you can revert the changes you did with them. When you are ready to leave the PC, you should be sure that you left no signs of your usage in it.


    0 of 8192 characters used
    Post Comment
    • CyberFreak profile imageAUTHOR


      6 years ago


      I am not sure I understand what you are saying...

    • Servis Noktasi profile image

      TimeOut Technical Support 

      6 years ago from Istanbul, Turkey


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)