Temporary Internet Files

What are Temporary Internet Files?

Temporary Internet Files are, in fact, the cache of the Internet Explorer. This means that when you load a web page with Internet Explorer, it is saved on your computer so that if you later decide to open the same page again, it will open a lot faster. Temporary Internet Files improve speed of web browsing and also make possible so called offline browsing, which gives you the ability to open the web pages from cache even when you are not connected to the Internet.

Despite all these positive things about Temporary Internet Files, they have one big drawback: they compromise your privacy. Everyone with access to your computer can look into your Temporary Internet Files folder (location of this folder is discussed here) and see the sites that you have visited in the past. You can manually delete the contents of Temporary Internet Files folder (explained here) but this will not erase all traces of the pages because a special file called Index.dat is placed in this folder and it will still preserve the names and even the dates of your first visits to many pages.

How to delete Temporary Internet Files?

To delete Temporary Internet Files manually, do the following things:

1. Start Internet Explorer and click Tools menu, then select Internet Options... from this menu. This will open the Internet Options window.
2. Click General tab and then find in the section Temporary Internet Files the button Delete Files... and click it. A new dialog box opens.
3. In the Delete Files dialog box, click to select the Delete all offline content check box if you want to delete all Web page content that you have made available offline.
4. Click OK to delete the files. Note that if you are doing this for the first time, the deleting can take a large amount of time, so be patient.

Mil Incorporated was founded with an ambitious objective to be a trusted software partner for individuals and enterprises around the world. Mil Incorporated provides software security and privacy solutions that incorporate state of the art technology, security expertise, and substantial resources.