PC Security - Internet Browsers
In a sense, one might consider a browser to have a built
in security system. Browsers act much like a mode of transportation for the
Internet, allowing us to travel to various destinations quickly and easily,
hopefully while implementing the security system to keep us safe while we
travel. Unfortunately, there are those who can break through that security
system, leaving us vulnerable to cyber carjacking, or in this case, computer
jacking!
There are ways, however, to minimize the security risk when you are traveling
the world wide web. It starts by selecting the right browser. While 90% of
Internet travelers use Internet Explorer for their world wide web transportation,
it isn't necessarily the best, or the safest to use.
Users have discovered that other browsers, such as Firefox, offer better
security than Internet Explorer. This doesn't mean that Firefox is better
than Internet Explorer, in terms of usability - it just means that it is
safer. It is also important to note that worms, viruses, and trojan horses
are often written specifically for a certain browser. Using a 'lesser known'
browser may actually keep you safer.
The next step to protecting your PC is education. You need to know about
and understand the various options that are available with your Internet
browser. These options play an important role in your overall system security.
There are numerous options that are essentially user-specified rules, although
these are typically set up by the network administrator or the system
administrators, even on personal computers running with a Windows XP or Windows
Vista operating system.
These options determine what controls are turned on and off within the browser,
which in turn, protects the PC by either allowing or disallowing certain
things to run from web pages, such as a VB script, an ASP application, an
XML document, Java, and JavaScript. Sometimes, these elements are used to
create viruses and even a Trojan Horse.
Average users can be very confused by how they should set the options in
the web browser. They will have the option of allowing ActiveX controls and
plugins and such. Most don't even know what those are! The good news is that
you don't have to be a computer doctor to figure these things out. Just simply
look at the options, and read about the various things you are being asked.
You can easily have all of your options set - in the correct way for your
risk tolerance - within a few hours.
The final key to computer security with your browser is to be careful about
the sites you are choosing to browse. First, you should always avoid downloading
any ActiveX controls when prompted, unless the web site is one that you truly
trust, such as Microsoft. These ActiveX controls may actually be dialers,
adware, spyware, or something equally nasty.
Just as the eyes are the window to the soul, your browser is the window to
your computer - and all of the information that you have stored on your computer.
When you are on the Internet, you are not only seeing the rest of the world,
but you are also being seen. If you are accessing a web site, you are equally
opening yourself up to being accessible. Usually, this access you are granting
is just in the form of a harmless cookies. These are fine. It is the executable
(or exe) downloads that one must be careful with.
PC Security: Index
PC Security:
Internet Browsers
PC Security:
Spam
PC Security:
Stopping Spam Part 1
PC Security:
Stopping Spam Part 2
PC Security: Spam
Scams
PC Security:
Email Security and Spam
PC Security:
Email Security
PC Security:
Computer Viruses
PC Security:
Protecting Computers From Viruses
PC Security:
Worm Viruses
PC Security:
Trojan Horse Viruses
PC Security:
Rootkits
PC Security:
Removing a Virus
PC Security:
Virus Hoaxes
PC Security:
Server Viruses
PC Security:
Home Network
PC Security:
Cell Phone Viruses
PC Security:
Spyware
PC Security:
Firewalls Part 1
PC Security:
Firewalls Part 2
PC
Security: Parental Control Software
PC Security:
Malware - Spyware and Adware
PC Security:
Data Backups
PC Security:
Pop Up Windows
PC
Security: Safe Public Computer Use
More
Articles
Web Development Tutorials
Cascading Style
Sheets Tutorial: An Introduction to Cascading Style Sheets
JavaScript
Tutorial: An Introduction to JavaScript
Web
Development: A step by step guide to developing a successful Internet
business
HTML
Codes Chart: Copy and paste HTML codes for your web page
HTML Tips:
Copy and paste special effect HTML codes for your web page
Web Design
Tips: Tips, tricks, and special effect codes for your web page
JavaScript
Code Snippets: Copy and paste special effect JavaScript codes for your
web page
216
Web Safe Color Chart: Hexadecimal and RGB Color Codes for your web page
ASCII Character
Codes Chart: American Standard Code for Information
Interchange character codes chart
|
|