Skip to main content

Guard Your Browser Against Internet Threats

When you are online, the entire worldwide web seems to be watching you. Visit a website and you will start receiving newsletters, promotional emails from a stream of different websites that you never even visited. Other than the website you visited, a number of websites are told about your browsing history and personal details like name, email address etc. without your knowledge and consent. Why does this happen? It happens because of your web browser for which you do not think enough. Since web browser is a medium to connect to the online world, you must secure it. Viruses, Trojans, malware, hackers use your internet browser to peep into your computer. The free internet browser support guide mentioned below will tell you ways to tighten your browser's security.
Instructions:
Download and install the latest security updates and patches for your web browser. To avoid manually doing the updates, turn on the automatic update feature in your web browser and relax. Your browser will automatically install updates without your intervention. Updates help keep your browser and the computer secured and protected from online and network threats. For Firefox, click Tools and select Options. Click the Advanced tab and then click Update, the sub-tab. click to select the button beside Automatically download and install the update. Click the OK button and then OK again to exit both the windows. Restart Firefox.
For Internet Explorer, click the Start button and go to Control Panel. Double-click Windows Update and then set it to Daily Updates. Save the changes and exit Control Panel. When you make this change, make sure Internet Explorer is closed. For Safari, click the Apple menu and select System Preferences. Select Software Update and set it to download and install updates automatically. Save the changes and close the window.
Block banners, pop-ups, plug-ins, and phishing websites. Also, block third-party cookies. Cookies are small files that a website places on your computer to track your origin and browsing preferences. A genuine website will use cookies to help you serve better, while a malicious one will use them to track your information and deceive you. Other than a few trusted websites, you can never be sure what will happen with your personal information. I have described the procedure of blocking cookies in Mozilla Firefox, Internet Explorer, and Apple Safari. Check the information below.
If you are using Mozilla Firefox, click the Tools tab and go to Options. In the Options tab, click the Privacy tab. Below Accept cookies from sites, you will see the Accept third-party cookies box will be checked. Click the drop-down menu and select ask me every time next to Keep Until. Click the OK button to exit the Options window. Close and reopen Firefox to make the changes effective. From now onwards, every website will seek for your permission before placing a cookie on your computer. If you think the website is genuine, hit Allow. Otherwise, click the Block button.
For Internet Explorer, click the Tools tab and select Internet Options. When in Internet Options, click the Privacy tab and then click Advanced. You will see two headings First-party Cookies and Third-party Cookies. Click the Prompt button below both the headings. Click the OK button to exit the Advanced Privacy Settings window. Click OK again to exit Internet Options. Close and restart Internet Explorer.
If you are using Mac Safari, click the Safari tab and then select Preferences. Click the Security tab and check the box next to Block pop-up windows. Under Accept Cookies, either click the Never button or the Only from sites you navigate to button. The latter option will let only the websites you visit to place cookies on your computer. Rest of them will not be able to place the cookies.
Disable Java, JavaScript, and ActiveX in your browser. In Mozilla Firefox, click Tools and select Options. Click the Content tab and remove the check mark from the Enable JavaScript box. Hit the OK button and restart Firefox by closing and reopening the window. For Internet Explorer, click Tools and select Internet Options. Click the Security tab and then click the Custom Level button. Look for ActiveX Controls and Plus-ins and click the Disable button. Click the OK button to exit the window. Click OK again to exit Internet Options. Restart Internet Explorer.
For Safari, click the Safari tab and select Preferences. Click the Security tab and remove check mark from the Enable JavaScript box. Save the changes and exit the window. Close and reopen Safari to make the changes effective.
Always sign out properly from a website. Do not stay signed in when you are not using your computer. Do not open emails with attachments or links from unknown senders. Do not open emails that say "congratulations, you won $80 million" (or a similar message). Such emails always demand your name, address, data of birth, identity proof, email address, and phone number etc. You should not share your personal information with unknown senders because they spam you with such messages.
Run a full virus scan after every 14-15 days to make sure that no virus intrudes into your computer. Always scan the downloaded files before opening them. Free utilities and software like free online virus removal software, tray clock, weather forecast, music, and video etc. often come bundled with virus, spyware, and Trojan among other malware. If you want to download a free utility, always trust a trusted, secured website. Do not visit the websites that don't use HTTPS, a secure and anti-phishing technique. You can download and HTTPS Everywhere, a plug-in. It forces several popular websites to use the HTTPs encryption and thus prevents intrusion and maintains your privacy.

Popular posts from this blog

IT EMPLOYEE HEALTH ISSUES

An increasing number of IT professionals have been finding it difficult to handle emotional stress, according to experts. An ‘occupational hazard,' the stress related to work needs to be addressed without delay, they emphasise.

“Coping with stress and striving for mental health welfare should be a matter of concern for all and not treated simply as a lifestyle problem of the ‘IT phenomenon',” says Nithya Chandrasekaran, a consultant physician for many IT companies in the city. Post-recession, employees feel pressured to perform well.

Regular occupational problems such as wrist problems due to constant handling of the mouse, slip disc and eye fatigue are common now, but handling stress that arises owing to fear of losing job or to cope with the increasing competition, affects the employee's performance, eventually, taking a major toll on his health, doctors explain.

The project that K. Balajee (29) was handling was pulled off after six months of its inception. Currently ma…

Hide Files or Folders Using Command Prompt

Hide Files or Folders Using Command Prompt This is my second instructable. This one is totally different from my previous post...
In this esteemed instructable i'll be guiding you to hide a folder by using cmd.. Even the folder option method won't be able to track the hidden folder

You'll need
1. Windows based operating system
Step 1: Run Command Prompt and Basic Text Commands There are several methods to run cmd.. Some of them are listed below

1. Start -> Run -> Cmd
2. Starrt -> Program Files -> Accessories - > Command Prompt

Command Prompt is a newer version of Dos and other os similar to that.. In order to fulfill your needs to hide a folder you must atleast know some basic commands ...

Cd - navigates through a folder
Md - creates a folder
Dir - Directory list
Attrib - provides with various attrib features
Step 2: Hide d targeted folder Alright, it's time to hide the folder

Presuming that I have a folder named Secret in F:\ Drive
Here are the steps to do

First of all n…

Computer Server

Server A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.

Many types of servers exist, including web servers, mail servers, and file servers. Each type runs software specific to the purpose of the server. For example, a Web server may run Apache HTTP Server or Microsoft IIS, which both provide access to websites over the Internet. A mail server may run a program like Exim or iMail, which provides SMTP services for sending and receiving email. A file server might use Samba or the operating system's built-in file sharing services to share files over a network.

While server software is specific to the type of server, the hardware is not as important. In fact, a regular desktop computers can be turned into a server by adding the appropriate software. For example, a computer connected to a home network can be designated as a file server, print server, or …