Internet Safety


If you are in an abusive relationship and your abuser has access to your computer, he and/or she may be monitoring your internet usage.  If this is a possibility your best and safest option is to use a computer your abuser does not have access to, such as those found at a friend’s house, family member’s house, workplace, local library and/or internet cafes.

If you do not have access to other computers, please read the information below.  It will help increase the safety of your internet browsing and computer usage.


The “Quick Escape” Button.

This Button is found on every page of this site.  It is located on the top right hand side of each page, within the sidebar.  It is there for those that need an immediate exit from the site.  Clicking on this button will bring you directly to Google.  It is important to understand that, although you may have left the site, traces of your visit to Out Of The Fog Now will remain on your computer.  This information can be easily accessed even by those with minimal understanding of computers.  Clicking the “Quick Escape” Button WILL NOT remove or delete any history of your internet browsing.  Below are steps you can take to cover your tracks.


Browsing the Internet:

There are several different browsers out there, but they all collect the same type of data, more or less, depending on the preferences set by the main user.  The type of information they can collect and store are: passwords, usernames, website addresses, downloaded files, time stamps and more.  Below are the most commonly used browsers and the corresponding steps you need to increase the safety of your Internet browsing.


  • The steps given below do not guarantee 100% removal of all information.  It is still safer to browse the internet from another location using a computer not accessible by your abuser.
  • There is a risk that you could remove data your abuser had saved.  For example, if your abuser has their email password saved for automatic log-in through a web-mail page and you follow the steps listed below, you may delete his and/or her information.  This will arouse suspicion, so it is crucial to keep this in mind as you read and follow the steps below.
  • Learn the steps below and remember them.  After each and every use of the internet, you should clear all your traces as a precaution to your safety.


Internet Explorer:

1.  Click on the “Tools” menu and select “Internet Options”;

2. In the “General” page, under “Browser History”, Select the “Delete” button;

3. Either “Select” and “Delete” per section: Temporary Internet Files, Cookies, History, Forms Data and/or Passwords;OR “Select” the “Delete All” button at the bottom to clear everything.

Mozilla Firefox:

1.  Click on the “Tools” menu, then select “Options” and then Click on “Privacy”;

2.  Click “Clear your recent history”.

3.  Make sure that all the boxes have been selected and Click “Clear Now”.


1.  Click on the “Safari” menu and select “Reset Safari”.

2.  Click on the “Reset” button.

3.  This will clear the history, empty the cache, remove the cookies and clear the downloads window.  It will also remove usernames and passwords, as well as clear the search engines of Google and Yahoo.



  • Any and all emails that have been “Sent” will be stored in your “Sent” items and/or folder.  To delete any trace of emails sent out, you must go to your “Sent” items and/or folder and “Delete” them.
  • If you began composing an email but did not “Send” it, it may be stored in your “Drafts” folder.  To delete any trace of emails of this kind, you must go to your “Drafts” folder and “Delete” them.
  • When you “Delete” an email, whether it initially came from “Sent”, “Drafts” or “Inbox”, it may still appear in your “Trash” folder.  To delete them completely, you must go to your “Trash” folder and “Delete” them there.
  • If you use an email program such as: Outlook Express, Thunderbird, Mail – you will have to “Delete” your “Deleted Items” from a folder on your computer as well.  (When I have more information on this, I will update accordingly.)
  • It is a very good idea to set up a new email account that you can access anywhere with a name that is not recognizable to you.


Password Tips:

  • Always use a password to access your computer.  If you do not use a password to log on to your computer, anyone can log on and gain access to the information stored there.
  • When creating a password, remember to make it something you will never forget but at the same time, it must be something that others will not know.  Never use addresses, birthdays, anniversaries, nicknames, pets names and the like, as these will be the first guesses intruders will try to use to gain access to your accounts.
  • Always change your password regularly.


*If you find that any information here is incomplete, out of date, or even, incorrect, please do notify us so that we may make the proper adjustments.


One Comment to “Internet Safety”

  1. Another way to keep someone from finding out about what you have been doing on the internet is to use Private Browsing. It can also be activated by pressing Ctrl + Shift + P. FireFox and Internet Explorer has this feature. Google Chrome has something called New Incognito window which does the same thing. What you view on the internet doesn’t show up in the history. It doesn’t record history or cookies when in this mode. I hope this information helps.

Share your thoughts.

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: