Why does the Quick Exit load lsu.edu catalogs or google.com?
These websites were chosen because they both load quickly and are likely pages that
would be natural for you to visit as a member of the LSU community. We provide two
pages in the code because the code behaves differently across browser and device types.
At minimum, it should load a "safe" webpage when it is clicked. In some browsers it
will also alter the state of the "back" button; so you may have to navigate back to
the page in the original way you found it once you are ready to view the resources
again.
Safe Browsing Tips
As you visit various websites, your web browser (i.e, Chrome, Safari, Firefox, Microsoft
Edge) stores a record of these visits in the web browser history. A browser history
is stored on desktop computers, mobile devices, and tablets.
Deleting your browser history can remove the information from immediate retrieval,
but there are tools that can be used to retrieve it.
Software can be installed on your computer to monitor your website activity; these
programs may also be used to steal your user names and passwords and can be used to
access your email accounts or other data-sensitive resources you use.
If you believe your computer or mobile device is being monitored, you may want to
take alternate precautions to prevent your abuser from following your online activities.
Completely deleting your browser history may raise suspicion from your abuser. If
you do not want to delete your browsing history try to make your history harder to
track:
- Use a browser that provides a private or incognito browsing mode. Using this mode
will not save your browsing history or store other information.
- Use a public access computer. These can be found at a local library, an internet café
or other shared technology center, use a work computer, or use a friend's computer.
If you are unsure of how to clear your browser history or to browse privately, use
your browser's "Help" feature to learn more about these features.
Other Forms of Monitoring
- If you think your abuser has gained access to your primary email account, you may
want to consider opening a separate email account for any sensitive communications.
Keep your monitored account active and only access your second account from a safe
computer and limit its use for your sensitive communications.
- Cell phones and other mobile devices can be used to retrieve calling and texting history.
The GPS function can also be used to track your physical location. If you feel your
phone is being monitored, consider obtaining a pay-as-you-go phone that you keep in
a safe place (i.e., work, friend's home).
- Be protective of what you post to social media; remember, once something is posted,
how it is used is out of your control. Do not post anything personal or anything that
can provide an abuser with ways to monitor you or locate you.
- Keep all passwords private and difficult to guess, even for someone who knows you
well. Do not write them down or save them in a place an abuser can find them. Consider
using a free password management tool so that you only have to remember a single password.
Several password management services have online portals so that you can access your
passwords using a private or incognito browser.