Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, May 29, 2013

Five steps to ultimate Firefox security

Posted on 7:55 AM by Unknown
Over the years, many have touted Mozilla’s Firefox as one of the most secure Web browsers. But as with other browsers, the security level offered depends on the settings. Some security features need to be manually enabled. Those turned on by default should still be double-checked.
Follow these five steps to lock down Firefox. Start with the essentials in the browser’s own settings, then choose some useful add-ons. Finally, keep track of your plug-ins so you can patch the inevitable security holes.

Enable a master password

Like other browsers, Firefox by default allows anyone who accesses your computer to log in to sites where you’ve saved the password. And as with Google Chrome, a list of the saved usernames and passwords can be viewed via the Options menu of Firefox.
ERIC GEIER
By default, nothing prevents others from viewing all your saved login info in Firefox.
Fortunately, Firefox offers a master password feature that encrypts and password-protects the saved password list. When enabled, you must enter the master password the first time you use a saved password, once per browser session. Additionally, even though you enter the master password the first time, you must always enter it before you can view saved passwords via the Options menu. This is a great feature to help prevent casual snooping of your passwords. It even prevents most third-party utilities from recovering them.
ERIC GEIER
Creating a master password prevents others from using or viewing your saved login info.
To enable the master password feature, open the Firefox menu, select Options,select the Security tab, and then check theUse a master password option.

Use a strong password for syncing

Like Google Chrome, Firefox has a syncing feature to synchronize your bookmarks, passwords, and other browser data to Firefox browsers running on other computers and devices. Fortunately, Firefox encrypts all synced data, not just your saved passwords (as Google Chrome does). Additionally, Firefox has more security than what Chrome offers by default when you’re setting up a new computer or device to sync. In Firefox, you must log in with your Firefox Sync password. Then you must either enter a random passcode from the new device into one that you've already set up, or take the recovery key from a device you’ve already set up and input that key into the new device.
ERIC GEIER
Syncing conveniently syncs your saved login and other browser data across multiple computers.
So you don’t have much to worry about with Firefox syncing—as long as you use a strong password, one with upper- and lowercase letters, numbers, and special characters. If someone knows or cracks the password, and has access to a device you’ve already set up with syncing, they can then set up other devices with syncing and access your passwords and other browser data.
To enable or change sync settings, open the Firefox menu, select Options, and select the Sync tab.



Verify that security options are enabled

Like other popular browsers, Firefox includes some basic security and privacy settings. Though most are enabled by default, you should ensure they haven’t been disabled.
ERIC GEIER
Make sure the first three security options are selected to protect against malware and phishing attacks.
Start by opening the Firefox menu and selecting Options. In the Options window, select the Security tab. Ensure that the first option, Warn me when sites try to install add-ons, is enabled to help prevent sites from automatically installing add-ons, as some can be dangerous. Then ensure that the next two options, Block reported attack sites and Block reported web forgeries, are also checked to help enable protection against malware and phishing.
ERIC GEIER
Check the first privacy option to help prevent websites from tracking your online activity.











Next, select the Privacy tab. And if you want more privacy online, select the first option, Tell websites I do not want to be tracked, which isn’t enabled by default. Although it can’t prevent all tracking, it will reduce tracking by those sites that support this type of option.
ERIC GEIER
Ensure that the first content option here is enabled to block pop-ups.
Now, select the Content tab. To prevent pop-up windows that can be annoying and even contain phishing ads, ensure that the first option is enabled: Block pop-up windows.
Lastly, select the Advanced tab, select theUpdate subtab, and ensure thatAutomatically install updates is selected.





Use add-ons for more protection

Consider installing these security-related add-ons for extra protection:
NoScript helps you control which sites can use JavaScript, Silverlight, Flash, and other embedded content, as they can be used maliciously to infect your computer or for phishing attempts.
Adblock Plus blocks banners, pop-ups, and video advertisements on websites to reduce clutter and the resulting annoyance; they can even reduce accidentally stumbling upon adware, malware, and phishing attacks.
Web of Trust (WOT) shows the user ratings of sites and blocks dangerous sites—such as those with malware—to increase safe surfing, shopping, and searching on the Web.
HTTPS Finder automatically detects and enforces HTTPS/SSL-encrypted connections when available—great in helping to reduce the chances of an eavesdropper on a Wi-Fi network from capturing your login details.
Xpnd.it! short URL expander allows you to hover over shortened links to see the real URL and other basic information about the site so you know where it leads before clicking.

Check and update plug-ins

Cyber criminals regularly use vulnerabilities in popular browser plug-ins (like Java and Adobe products) to infect and invade computers. Most plug-ins regularly release updates to patch security holes. Many plug-ins are set by default to update automatically or at least to notify you of them. However, it’s a good idea to check periodically for updates. Consider using the Mozilla plug-in checker or third-party sites like Qualys BrowserCheck for updates for other browsers.
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Will New Internet Domain Names Change the Web?
    Finally, the World Wide Web will live up to its name. The decision by the Internet Corporation for Assigned Names and Numbers (ICANN) that W...
  • How to sync files and folders across two PCs
    Here are four ways to do this, although--technically speaking--only two of them actually keep the files on both PCs. The others merely make ...
  • Rumored Sony PS4 controller shows new thumbsticks
    As the speculation on Sony's next game console is ramps up ahead of  next week's press event , a pair of images have surfaced, purpo...
  • Twitter: Hacking attacks may have accessed data of 250K users
    Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absco...
  • When malware strikes: How to clean an infected PC
    You work hard to protect your PC from the malicious thugs of our digital world. You keep your antivirus program up to date. You avoid questi...
  • Yahoo Reject Microsoft ! Glance At New Corp.
    As we know, Microsoft is aggressively try to overtaking Yahoo. They launch 44,6 billion dollar AS bid ! This is the biggest offer that ever ...
  • Why Microsoft redesigned Windows
    Windows 8 has its fans and foes, but Microsoft felt the time was ripe for a new look and feel for a product used by more than 1.2 billion pe...
  • Rugged laptop guide
    Our rugged laptop guide will give you more information on rugged laptops and rugged notebooks than, let’s say, 95% of regular rugged laptop ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • Convert a Kindle ebook to a different format
    When you buy an ebook from Amazon, it's yours, right? Technically speaking, Amazon is merely licensing the book to you. And the company ...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ▼  May (9)
      • Five steps to ultimate Firefox security
      • How to upgrade your external hard drive to USB 3.0
      • How to create a Windows 8 shutdown tile
      • Why some Web sites are much slower than others
      • How to undo accidental browser zoom
      • Passwords: You're doing it wrong. Here's how to ma...
      • File extensions control which application can open...
      • Three quick ways to ease your transition to Windows 8
      • Keep your laptop battery healthy: Use it sparingly
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile