Showing posts with label Tips. Show all posts
Showing posts with label Tips. Show all posts

Wednesday, February 11, 2015

Be aware of Swine Flu & its symptoms - Random Wednesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



It was in April 2009 that a reassortant virus (a virus originating from a mix of human, bird and swine gene sources) hit the united States population and later swept all across the globe. This h1n1 type 1 influenza virus may find its birth through direct contact with pigs, but the yet to end outbreak has now managed to render humans as carriers themselves and hence repeated genetic drifts require the vaccines to be replicated repeatedly as well.



The influenza virion is roughly spherical. It is an enveloped virus; the outer layer is a lipid membrane which is taken from the host cell in which the virus multiplies. Inserted into the lipid membrane are ‘spikes’, which are proteins – actually glycoproteins, because they consist of protein linked to sugars – known as HA (hemagglutinin) and NA (neuraminidase). These are the proteins that determine the subtype of influenza virus (A/H1N1, for example). The HA and NA are important in the immune response against the virus; antibodies (proteins made to combat infection) against these spikes may protect against infection. The NA protein is the target of the antiviral drugs Relenza and Tamiflu. Also embedded in the lipid membrane is the M2 protein, which is the target of the antiviral adamantanes amantadine and rimantadine.






The condition is often confused with other common health issues due to similar clinical manifestations such as:

  • Body aches and headaches
  • Coughs
  • Chills
  • Fevers
  • Sore throat
  • A drop in your appetite
  • Runny nose
  • Throat irritation
  • Nausea
  • Stomach upset
  • Tiredness from all the above symptoms

Vomiting and diarrhea may accompany these symptoms in most cases. Children effected may also experience neurological changes such as seizures or mental health alterations. As observed, children, pregnant women, obese individuals, and those with respiratory and neurological disorders are more vulnerable to swine flu. Naturally, immune compromised patients such as those having cancer or AIDS may also contract the disease easily like most other diseases



If a person becomes sick with swine flu, antiviral drugs can make the illness milder and make the patient feel better faster. They may also prevent serious flu complications. For treatment, antiviral drugs work best if started soon after getting sick (within two days of symptoms). Beside antivirals, supportive care at home or in a hospital focuses on controlling fevers, relieving pain and maintaining fluid balance, as well as identifying and treating any secondary infections or other medical problems. The U.S. Centers for Disease Control and Prevention recommends the use of oseltamivir (Tamiflu) or zanamivir (Relenza) for the treatment and/or prevention of infection with swine influenza viruses; however, the majority of people infected with the virus make a full recovery without requiring medical attention or antiviral drugs. The virus isolated in the 2009 outbreak have been found resistant to amantadine and rimantadine.

In the U.S., on April 27, 2009, the FDA issued Emergency Use Authorizations to make available Relenza and Tamiflu antiviral drugs to treat the swine influenza virus in cases for which they are currently unapproved. The agency issued these EUAs to allow treatment of patients younger than the current approval allows and to allow the widespread distribution of the drugs, including by volunteers.



Laboratory diagnosis is significant to confirm flu but repeated tests are a good idea as the rapid fly test is not very accurate and depends on the sample collection and testing methods. One can prevent the onset of flu by following simple practices:

  1. Follow personal hygiene - washing hands, using clean cooking utensils, maintaining a separate napkin to wipe your nose and mouth, using a separate drinking water glass, etc. Can be simple ways to prevent the spread of infection
  2. Public health advice such as school closures, travel regulations, isolation is medically prescribed and keeping a good distance from potential crowds are preventive measures that can be taken.
  3. Vaccinations do help significantly but may need to be tweaked due to observed genetic drifts.
  4. Gargling with warm salt water to keep yourself hydrated
  5. Avoid close contact with infected people.
  6. Get enough sleep
  7. Eat a well balanced diet with lots of fruits and vegetables to keep your immunity going

Keep this piece of information on your fingertips to keep flu at bay.

Tuesday, January 27, 2015

Can we speed up Mozilla Firefox? Let's try these tweaks! - Tech Tuesday

Hey there! Been more than a while that I posted something on a Tech Tuesday, isn't it? Well I don't get much time, what can I do? And I miss being here a lot! :/ Anyways, lets get to the business, and I welcome you all to my blog on this wonderful Tuesday afternoon!



So today we are here to discuss certain little "tweaks" which can help you speed up your favorite web browser, Mozilla Firefox! These have been discussed at many places, many a times, but not in detail as we, you and I, shall do today. Why are we discussing Firefox? Well, it's my favorite web browser since last 7 years at least! It has topped the charts for years altogether, and being in close competition with the Google Chrome once it was launched. Though, one will have to agree, it maybe the case that home users are preferring Chrome just because of their "Google-Tainted lenses" but for the developer community and also the "Not Google Blind" users, Mozilla Firefox has ruled the day, ALWAYS! So let's get to the discussion.



Trick one: Pipelining


Perhaps, the most talked about, and the most deserving candidate to be on the top of the list is "Enable Pipelining in your Mozilla Firefox to make it faster." Now the point is, how to do that? And ones we learn that, well, what the hell is that?! O_O

How to enable pipelining?


1. Type about:config in the address bar.

2. Double-click network.http.pipelining and network.http.proxy.pipelining so their values are set to true.

3. Double-click network.http.pipelining.maxrequests and set this to 8.

4. Done!

What will this do?


This will dramatically reduce page download times.

Who should do this?


Those who have a fast Internet Connection and use general purpose Internet, should definitely go for it. Don't set the value beyond 8, since there's no point of setting the value beyond 8, and not less than 4, again which'd be pointless. If you have a slow Internet Connection, or you access traffic sensitive websites, which are unable to handle many request at a time, or ban you for a DoS attack if you try to access them again and again, you should not go for pipelining.

What exactly happens behind the scenes?


Normally, HTTP requests are issued sequentially, with the next request being issued only after the response to the current request has been completely received. Depending on network latencies and bandwidth limitations, this can result in a significant delay before the next request is seen by the server.

HTTP/1.1 allows multiple HTTP requests to be written out to a socket together without waiting for the corresponding responses. The requestor then waits for the responses to arrive in the order in which they were requested. The act of pipelining the requests can result in a dramatic improvement in page loading times, especially over high latency connections.

Now all that simply means, you request a page multiple times in one go, making the server respond to all those, thus the responses are combined as one, giving you a faster result. Now since Firefox is capable of sending 8 requests at a time, you should not set the maxrequest value above 8. And also, since Firefox sends 4 requests by default, never make the value go below 4. Always know what you are doing before you proceed, okay?



Trick two: Block Flash




Yes you heard that right! Rather, read that right. Actually flash is such a disaster to memory. Most of the websites have flash content which is of no use. Of course video websites, like YouTube, and all, won't like if you do so(even though they have the workaround of an non-flash video player, thanks to HTML5), still disabling flash is for your own good. Mostly it would prevent annoying ads, or popups in some cases, save you your data, and blah blah blah! Most importantly it would help you to save your Computer Memory, which would let you have a more easy experience with the web browser. You know how to do that? No? Well simple. Get some extension like Flashblock, or go to Addons(Ctrl+Shift+A) -> Plugins -> Shockwave Flash -> Ask to activate. Now Ask to Activate is a safer option than Disable since on pages where you need Flash, you can simply enable them with the help of a ribbon that would run on top asking you to enable flash. Though disabling on the other hand will make you enable it and disable it whenever needed and not needed respectively. This option will disable flash on all pages unless you click on the ribbon and reactivate it.

Trick three: Getting rid of the clutter regularly is a good habit




It would be a good practice to keep your browser clean. Though most of you already do, thanks to tonnes of crap roaming around the Internet keeping your nights busy -_- but still, keeping the cache of firefox clear is a great way to speed up your borwser, your computer, but well, at times reducing the Internet speed at times, because your browser will have to download the old content again just because there was nothing in the cache. But still always keep it clean, it is worth the tradeoff. You know how to do it, if not, it is rather simpler and easier to download CCleaner and let it do the work for you. :)

I guess these are safest tips. I have a huge set of settings that can help you make the performance be even better, but well most of them have associated risks. I will discuss them all in total maybe later when I get more time to do so. For now do these and have fun. These will help you all a little bit, if not a lot.

So now I must take a leave, good day friends. Have fun! :) See you all soon ^_^


Tuesday, May 6, 2014

Fix Vmware tools "kernel header path is not valid" error - Tech Tuesday

Hey all! A warm welcome to my blog on this Tech Tuesday! :)



Today I wish to discuss how to fix Vmware tools "kernel header path is not valid" error.



Have you tried installing a Debian/Ubuntu based Linux Distro on VMware? Most of them (including Ubuntu) are unable to find Kernel Header path and hence VMware tools are not installed leading to a bad experience of virtualization. But there is a work around in which we download Kernel Headers, update them, and let the VMware Tools installation find their path.

I am listing here the steps you should follow in such a scenario to successfully install VMware Tools in Ubuntu/Debian based Linux Distro (This includes, Ubuntu, Edubuntu, Kubuntu, Xubuntu, Lubuntu, Gobuntu, Linux Mint, etc.)

First and the most important thing is -> POWER ON YOUR VIRTUAL MACHINE! :P

1. Open up the terminal. Use the su command to enter the super user mode. Type su in the terminal, hit enter, and enter the root user password. Hit enter again. The prompt shall change from $ to #. This implies you are in the super user mode.

2. Download the linux headers using the command:


Don’t make any changes in the above command.



Wait for the downloading to complete.

3. Create a symbolic link to version.h file. Use the following command without making any changes to it:


4. Now install VMware tools

5. Click on VM in theVMware Toolbar, and click Install VMware Tools



6. Extract VMware Tools: Open the CD mounted when you clicked Install VMware Tools in the VMware Toolbar. Right click the VMwareTools-<something>.tar.gz



Click Extract To and extract the VMware Tools to a convenient location



Wait while the file finishes the extraction.

7. Now open that location, the folder where you extracted the VMware Tools. Open the extracted folder.

8. Right click somewhere in the folder and click Open in Terminal



9. Enter the super user mode using the su command as you did in step 1.

10. Use the ls command to check the presence of vmware-install.pl file

11. Type the following command (in super user mode):





12. VMware Tools installation begins. Follow the simple steps which are self explanatory (most of the times you just have to hit enter! :D)

13. DONE!

I hope this helped you. Well it was a mess for me to go into virtual linux without the VMware tools, don;t know about you! :P Have fun, hope to see you all soon again! :D


Tuesday, April 8, 2014

Guidelines for securing Operating System Part 11 – Wireless Network Connections – Tech Tuesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



Continuing the Security Tips series I started in July '13, today I wish to discuss with you all the topics listed after the following links. Just in case you want to access the last posts in this series, here are the links:

Part 1: General Guidelines - Click Here
Part 2: Microsoft Windows - Click Here
Part 3: Macintosh - Click Here
Part 4: Guest Accounts - Click Here
Part 5: Windows Firewall - Click Here
Part 6: Event Viewer & Netstat - Click Here
Part 7: Antiviruses - Click Here
Part 8: Data Encryption - Click Here
Part 9: Cryptography Tools & True Crypt - Click Here
Part 10: Browser Security - Click Here

Today I am going to discuss with you all certain aspects about Wireless Network Connections & Security.

Let's first consider in brief the structure of this post.

  • Introduction
  • Home Network
  • Steps for Home Networking
  • Wireless Networks
  • Setting up a Wireless Network
  • Common Threats to Wireless Network
  • Wireless Network Security
  • Conclusion/Comments

Introduction


A fast Internet Connection always enhances browsing experience; at the same time, it attracts the attackers seeking someone to play with! So knowledge about setting up a network is necessary, but this knowledge is incomplete without the knowledge about the Network Security.



Home Network


Home computers are widely used to send emails, listen to music, watch videos, download stuff, play games, etc. etc. etc.! And I guess most of the people have more than one computer these days. Many of these people do setup home network, but not all. So I would like to discuss how to do that, how to secure that, and to begin with, why to do that.

With a home network we can optimize the experiences of computers in a home network because:

  • A home network will let the users share Files and Documents
  • A home network will let the users share an Internet Connection
  • A home network will let the users share Printers and Scanners
  • A home network will let the users share Stereos, TV, game systems
  • A home network will let the users share DVD/CD Burners



Steps for Home Networking


Home Networking is the same thing I was telling you earlier, the network setup you use at your home (generally) to connect your personal devices like PCs, laptops, TV, etc.

To setup a home network you require:

  • At least two computers with a LAN card each to setup a network
  • One router to connect the computers (and Internet)
  • Optional: One Internet Subscription Line (If you wish to share an Internet Connection)

To setup a home network:

  • Check the computer’s hardware and make a note of this information
  • Purchase the required hardware, router/hubs/switch. If you wish to share Internet, prefer a switch/router. If you wish to share files, printer, etc. then a hub is good enough. If you wish a wired network, buy LAN Cables, viz. Ethernet cable with RJ-45 socket. If you wish to create a wireless network instead, you’d need additional wireless adapters (or dongles) to connect the devices without the Wi-Fi compatibility.
  • Make sure all the computers have Network Interface Card/LAN Card.
  • Make the connections
  • Select a host computer and connect it to the Internet. You can connect a Router instead.
  • Connect the other devices using the router/switch/hub
  • Install network adapters in all the ocmputers.
  • You might need to restart, though I’d recommend restarting.

Wireless Networks


Wireless networks are used to connect the computers to each other without any cables. They have become popular due to ease of installation and the increasing popularity of mobile devices (laptops, phones, tablets).

The major advantage of this wireless network is user mobility that is of course within a certain range, the range of the wireless network. In order to accommodate enough devices our devices providing this wireless network to the mobile devices should have enough bandwidth.



Setting up a Wireless Network


Now let’s discuss how to setup a wireless network in Windows 7 and Mac OSX.

Setting up a Wireless Network in Windows 7


I consider that you have got a wireless router, a wireless adapter (to connect your PC to the router, if you have Wi-Fi in that already, then you won’t need the adapter). The Wireless router will be fed with the Internet Connection, and the wireless adapter will help connect your PC to the wireless router, hus giving access to the Internet.

Steps:

  • In Start, in the search box, type Network and select Network and Sharing.
  • Click Set up a Connection or Network.
  • Click Set up a new network and click Next.

You can self-guided further! :P



Now consider you wish to make some modifications in this wireless network:

  • Select Manage Wireless Network from Network and Sharing Center
  • Click Add and select Manually create a network profile.


  • Fill in the details
  • Check the option Start this connection automatically and connect even if the network is not broadcasting and click Next
  • Select Change Connection Settings
  • Uncheck the option Connect to a more preferred network if available in the connection tab.
  • In the security tab, select Microsoft Protected EAP (PEAP) and click Settings.
  • Protected EAP properties popup: Check the option Validate server certificate.
  • In Trusted Root Certification Authorities, check Class 3 Public Primary Certification Authority.



  • In select Authentication Method, select Secure password (EAP-MISCHAP v2) and click the Configure button.
  • Uncheck Automatically use my Windows logon name password (and domain if any) and click OK to dismiss each of the open windows.
  • A balloon will appear near the system tray that reads, Additional Information is required to connect to <NAME that you provided>. Click this balloon.
  • Enter your NETID and password. Once validated, another balloon appears, “Additional Information is required to connect”
  • Click the balloon -> OK to agree and validate the server certificate.
  • After few minutes, you will be connected to your wireless network.






Setting up a wireless network in Mac


  • Click Network Pane in system preferences and choose AirPort entry.
  • Check the Show AirPort Status in Menu Bar check box.
  • Choose the system preferences.
  • Click the AirPort status icon in Menu Bar.
  • Click Create network and enter a name for the network.
  • Check the required password check box.
  • Enter a password for your network and then enter it again to confirm it.
  • Click OK.



  • Go to the upper right Airport icon.
  • Select the UConnect option from the drop down menu
  • Complete the User Name and Password fields, select Automatic for 802.1x, and check Remember this network.
  • Click OK
  • Accept the verification certificate by clicking Continue. Now you will be connected to UConnect shortly. If not, you need to check your profile.
  • Go to system preferences and click Network.
  • Verify that you are connected.
  • Select Airport to the left and click Advanced.
  • Click on the 802.1x tab and select the WPA:UConnect profile.
  • Verify that PEAP is the only protocol checked.
  • Select the Configure Trust buton.
  • Select the Servers tab. Click the + and select one of the available servers. Click OK.
  • Hit OK twice and click Apply



Common Threats to Wireless Network


If an attacker gains access to your wireless network, he/she can exploit this weakness to:

  • Read user email and instant messages as they travel across the network.
  • Monitor the websites visited by you.
  • Copy your usernames and/or passwords.
  • View files on the computers and spread malware.
  • Disclose your confidential information.
  • Interrupt the wireless service and implement unauthorized WLAN.
  • Send spam or perform illegal activities with your Internet connection
  • Slow your Internet and/or computer performance.

Wireless Network Security


I have discusses Antiviruses and firewalls in great detail in my earlier posts, and you should read them and make sure you have an updated copy of both. Other things that you need to take care of include:

  • Turn off the network during extended periods of idling/non-use.
  • Revisit WLAN network design for any incorrect access point placements.
  • Do not connect to unprotected wireless networks in public places.
  • Change the default SSID.
  • Change the default administrator password (and preferably usernames too).
  • Disable or turn off SSID broadcast for the network to make the network invisible to attackers.
  • Enable MAC Address filtering to keep track of all network MAC devices connecting to the router.
  • Data transmitting over wireless networks should be encrypted to prevent eavesdropping, interception, and data modification.
  • Network-level denial of service attacks are prevented by using user authentication.
  • Unauthenticated access to the wireless network can be prevented by using a virtual private network (VPN) connection and IPSEC.
  • VPNs keep communications safe by creating tunnels through which the encrypted data travels.
  • A network should be scanned using software scanning tools to locate and shut down rogue WLANs.
  • If the user is connected to an unprotected wireless network at public places, do not visit a website that requires a password unless the website is encrypted.

Conclusion/Comments


I hope you find all the relevant information you must know about the topic of security I discussed with you all today. For any queries or suggestions please feel free to comment here.

I hope you all have a great day ahead! :) Happy Tuesday :) See you all soon! :D


Tuesday, April 1, 2014

Guidelines for securing Operating System Part 10 - Browser Security - Tech Tuesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



Continuing the Security Tips series I started in July '13, today I wish to discuss with you all the topics listed after the following links. Just in case you want to access the last posts in this series, here are the links:

Part 1: General Guidelines - Click Here
Part 2: Microsoft Windows - Click Here
Part 3: Macintosh - Click Here
Part 4: Guest Accounts - Click Here
Part 5: Windows Firewall - Click Here
Part 6: Event Viewer & Netstat - Click Here
Part 7: Antiviruses - Click Here
Part 8: Data Encryption - Click Here
Part 9: Cryptography Tools & True Crypt - Click Here

Let's first consider in brief the structure of this post.

  • Introduction
  • Cookies
  • Internet Explorer Security Settings
    • Internet Explorer Security Settings: Internet Zone
    • Internet Explorer Security Settings: ActiveX Control
    • Internet Explorer Security Settings: Local Intranet Zone
    • Internet Explorer Security Settings: Trusted Zone
    • Internet Explorer Security Settings: Restricted Zone
    • Internet Explorer Privacy Settings
    • Securing Files Downloads
  • Mozilla Firefox
    • Mozilla Firefox Security Settings
    • Mozilla Firefox Privacy Settings
    • Securing File Downloads
  • Google Chrome
    • Google Chrome: Privacy Settings
    • Google Chrome: Security Settings
  • Apple Safari
    • Apple Safari: Security Settings
  • Conclusion/Comments

Introduction


Internet Security involves basic security measures to protect a user’s account from attacks when connected to the Internet. It explains security elements that are necessary for the user to use the Internet safely.



Coming to more precise and detailed thing, Internet Security involves protecting the user’s data and information from unauthorized access (through Internet attacks), apart from the various viruses, and other malware.

Attacks on the Internet are common through (but not restricted to) the following:

  • Emails: An important means of communication, and traditionally a great way to spread viruses. The email attachments and the stupid links are the most common way how the attackers spread the viruses. At times they’d use the fake email IDs which’d resemble some real email ID and an inattentive user will fall prey.
  • IM: Although the days of Yahoo! Messenger, gtalk, etc. are gone, but facebook and skype messengers have gain huge interest of the users, and thus the attackers. Those who have used the Yahoo! Messenger, know how the chat rooms are infected with spam bots who keep spreadin the malware all the time.
  • File Sharing and Downloads: Ultimately virus comes from some file you downloaded, intentionally, unintentionally, yourself, or some automated script on a malicious website did that. Thus be careful of what you download on the Internet.

Cookies


A cookie is information provided by a web server to a web browser and then sent back unchanged by the browser to that server when the browser access that server. Your sessions are managed using cookies on most websites. You must have noticed the ‘Keep me signed in’ or ‘Remember me’ checkbox on 99.99% websites at the login form. That actually generates a cookie with a large session time (typically 30-60 days) with the user login credentials (encrypted). Thus when you open that website next time, the web browser automatically logs you into that website by checking that cookie with the server.

Cookies are not viruses, and they have encrypted information. Still they are dangerous. Why? They hold your important information, like your login credentials. Try this: Delete your cookies and open my blog again. You’ll see totally different kind of ads! Why? Because the advertising websites generate a cookie that tracks your internet activity broadly. I mean they track the “type” of website visited by your browser. This information is then used to target ads which they think are of your interest based on the types of websites you visited.

Though this ad-racking thing is not risky, and sometimes helps us getting good and relevant ads (for a change), but the cookies still hold your login credentials and session information, even though the information is encrypted. Thus, you must keep them clear off your computer.

Internet Explorer Security Settings


Let’s start by configuring Internet Explorer for security. I’d suggest you all that, in case you use Internet Explorer, try to transfer to some other web browser which is safer. Internet Explorer is a good browser, but unfortunately, quite unsafe.

Let’s first open the security settings, and then I shall discuss in details how to configure them. I am discussing Internet Explorer in more detail than the other web browser. With a proper mapping, you can find most things are common to all browsers.

Launch Internet Explorer -> Click the Tools button -> select Internet Options.



Select the Security Tab and see what all are the zones different websites can be classified into. You can use these settings to make yourself more secure, block certain websites, etc.



Internet Explorer Security Settings: Internet Zone


The Internet Explorer includes predefined zones: Internet, Local Intranet, Trusted Sites, and Restricted Sites. A user can set the security options for each zone and add or remove websites from the zones by estimating the level of trust or risk in a particular website. The Internet zone is for all websites except those listed in the trusted or restricted zones.



Just select a zone for which you’d like to configure the settings. Then use the slider to adjust the security levels. The information displayed to the right of the slider clearly explains what happens at that security level set by the slider. You can click the custom level… button to set certain different criteria.

Internet Explorer Security Settings: ActiveX Controls


ActiveX controls are the building blocks of a small program that distribute applications through the web browser. By default, Microsoft has set the security settings for it to medium. Thus by default you can run signed ActiveX controls.

Now since you are free to change this default behaviour, you can set the security level for ActiveX to low/medium/high/custom. Why would you like to do that? It is because these ActiveX controls can be used to install software on your system, like Windows Update does. But some malicious person might use them to install viruses on your system. So staying on guard, is better. To protect yourself from such threats you can do the following:



  • Disable the ActiveX Controls and Plugins options in the Security Settings. With Windows XP gone, we don’t need browser to update, right? Windows 7 onwards has got that Update Utility.
  • Enable the Automatic prompting for ActiveX controls option so that the browser prompts when an ActiveX control or plug-in needs to be enabled.
  • Click Ok to apply the settings

You have got more options if you wish to customize more. But I am sharing the common ones that are sufficient for a nice level of security. Alternatively, use the High level from the drop down list.

Internet Explorer Security Settings: Local Intranet Zone


The Local Intranet Zone covers the sites on the Intranet. To add websites to the Local Intranet Zone:



  • Select Security -> Local Intranet
  • Click Sites.
  • Click the Advanced button.
  • Enter the URL into the Add this website to the zone: column and click Add.
  • Click OK to apply the settings.

Internet Explorer Security Settings: Trusted Zone


A trusted zone contains those websites that a user believes will not damage his or her computers or data.
To add websites to the trusted site zone:



  • Select Security -> Trusted Sites
  • Click the Sites button
  • Enter the URL into the Add this website to the zone: column and click Add.
  • Click OK to apply the settings.

Internet Explorer Security Settings: Restricted Zone


The restricted zone restricts access to the websites that might damage a computer. Users can avoid accessing a restricted site by adding it to the restricted zone. The Restricted Sites zone will help prevent the installation of unwanted applications, reduce unwanted pop-ups, and not allow sites to run unwanted scripts. This setting also protects the privacy by not sending cookies to sites in the Restricted Sites Zone.



To add websites to the restricted site zone:

  • Select Security -> Restricted Sites
  • Click the Sites button
  • Enter the URL into the Add this website to the zone: column and click Add.
  • Click OK to apply the settings.

Internet Explorer Privacy Settings


Information stored in a cookie is limited in such a manner that it cannot carry a virus. But the information is good enough to be of use for someone who knows how to use it for bad things, like session hijacking.

So keeping the cookies clear is a good idea. I have time and again stressed upon the use of CCleaner. The free version does most of the tasks.

To configure cookie settings in Internet explorer:
  • Choose Internet Options from the Tools menu on the browser.
  • Select the Privacy tab and use the slider to set the level to low, medium, medium-high, or high.



  • Block all or accept all cookies, depending on the requirements. Though for a home user who access so many websites that need cookies, I guess you’ll have to stick to accepting the cookies.



  • Check the Turn on Popup Blocker option to block pop-ups that appear while visiting websites.

Deleting the Browser History


That sounds familiar right? You have done that sometime because some forum suggested, or to protect your privacy from others, or your ISP customer support said, your Internet is slow due to Temporary and Cache data, so you need to clear it. Clearing the browsing history protects your privacy, a little step to clearing your Internet footprints (at your PC atleast!) and also saves you Hard Disk Space. Here by history I not only mean the browsing history, but also the micro caches of the browser, cookies, private data, temporary files, etc. You should clean your Internet temp monthly, or once in three months atleast. Again you can use the CCleaner to automate the job for you. For better results, you may try TuneUp Utilities.

  • Choose Internet Options from Tools menu.



  • Go to the Browsing History section
  • Check the desired options in Delete Browsing History window. I suggest cleaning everything (not just history) once in three months atleast.
  • Click Delete to delete browsing history.




A personal suggestion is don’t save your passwords on your browsers! They are really risky if someone gets access to your PC. I don’t mean just a friend playing a prank on you, but the viruses too, who can get access to the passwords that you might have saved.

Securing File Downloads


Sometimes the file download starts automatically, or the location of the download is not asked. This should be taken care of and thus all downloads should prompt and on user’s acceptance should be downloaded. Users can configure the download settings in the Internet Explorer to set permissions to download files from the Internet. This setting controls whether Internet Explorer should allow downloads or not. File downloads can either be enabled or disabled.



  • To configure the download settings for Internet Explorer, click Tools -> Internet Options -> Security.
  • Select the Custom level button in the Security Settings window.
  • In the Downloads settings, enable the File Download, and Font Download options.
  • Click OK to save the settings.

Mozilla Firefox


Firefox is a secure, fast, and customizable web browser. Securing Firefox Settings is easy just like the Internet Explorer. Launch Mozilla Firefox. Click Tools -> Select Options.








Mozilla Firefox: Security Settings


A user can control the level security. You can customize settings like passwords, cookies, popups, etc. Following are the steps:

  • Select Security from the Options window.





  • Check the option Warn me when sites try to install add-ons so that the browser prompts before installing add-ons to the browser.
  • Click the Exceptions button and enter the URL into the Address of Website field and click Allow to specify the websites allowed to install add-ons.



  • Check the Block reported attack sites option to prevent the user from visiting malicious websites.
  • Check the Block reported web forgeries option for Firefox to actively check whether the sites visited may be an attempt to mislead the user to provide personal information.
  • Uncheck the Remember Passwords for sites options to prevent the browser from remembering passwords for login pages visited.

Mozilla Firefox: Privacy Settings


To set the privacy settings in the browser, follow these steps:

  • Select Privacy in the Options window.



  • Firefox allows the user to choose if they want the browser to remember their history. The user may select the option Never remember history to maintain privacy.
  • Click Clear your recent history.
  • Select the time range to clear the history.



  • Check the options required to clear the history and click Clear Now.

Securing File Downloads


Just like we did for Internet Explorer, we need to secure file downloads for Firefox too. But it is pretty simple.



  • In Firefox, files are downloaded by default to Documents -> Downloads. We must change the setting such that it asks every time where to save the file.
  • Navigate to Tool -> Options -> General
  • Check the option Always ask me where to save the file to allow the browser to ask before downloading a file to the desired location.

Google Chrome


Another popular browser we have by the name of Google Chrome, developed by Google. TO change the security/privacy settings:

  • Launch Google Chrome.
  • Navigate to http://chrome:settings



  • Click Advanced Button at the end of the page

Google Chrome: Privacy Settings


  • Scroll down to Privacy Settings.






Google Chrome: Security Settings


In the Google Chrome Settings:

  • Secure Sockets Layer(SSL) is an Internet Protocol used by many websites to ensure safe data encryption and transmission. The SSL setting in the web browser is turned on by default.



  • Some websites require the older version, SSL 2.0, so check the Use SSL 2.0 checkbox too.
  • Check the Check for server certificate revocation option to turn on real-time verification for the validity of a website’s certificate for extra security.

Apple Safari


By default, Safari is set to display a few web features, such as some movies, animation, and web applications. A user may wish to turn off these features to help protect privacy from possible security risks on the Internet. The Safari browser contains features equivalent to those in Firefox, with some differences. To change the security settings in Apple Safari:

  • Launch Safari
  • Click on the gear icon and select preferences.




Apple Safari: Security Settings


To configure security settings in Safari web browser:

  • Select the Security Tab in the preferences window.
  • The Web content section permits the user to enable or disable various forms of scripting and active content.
  • It is recommended to accept cookies only from sites visited.
  • Check Ask before sending a non-secure form to a secure website option, which allows the browser to warn the user before opening any website that is not secure.





Conclusion/Comments


I hope you find all the relevant information you must know about the topic of security I discussed with you all today. For any queries or suggestions please feel free to comment here.

I hope you all have a great day ahead! :) Happy Tuesday :) See you all soon! :D