Tuesday, October 22, 2013

Security for Browser

Browser hijacking is a type of online fraud. Scammers use malicious software (malware) to take control of your computer's Internet browser and change how and what it displays when you're surfing the web. If you are already a victim of a hijacked browser, the following instructions can help you free your browser from the hackers, restore browser settings, and boost browser security.

Help free your browser from hackers
Antivirus and antispyware software helps prevent and detect malware. If any malware does manage to bypass your firewall, antivirus and antispyware software will help remove that potentially dangerous software. If you have Windows 8 installed, antivirus software is included with the operating system. You are not required to do anything to set it up. If you are using earlier versions of Windows, Microsoft provides free antivirus software called Microsoft Security Essentials. Many of our partners also offer antivirus software.

Help restore your browser home page
If your home page keeps changing back to another page, this might be a sign that your computer is infected with a virus. After you have updated your computer with the latest antivirus software, restore your browser home page.
To change your home page in Internet Explorer 10
  • Internet Explorer 10 is the latest and most secure version of the Microsoft web browser.
  • Download Internet Explorer 10 to help protect your computer against viruses, fraud, ID theft, and other threats.
  • In Internet Explorer, navigate to the page that you want to make your home page.
  • Click the down arrow next to the Home icon on the Internet Explorer toolbar, and then click Add or change home page.
  • Click either Use this webpage as your only home page or Add this webpage to your home page tabs.
Help boost browser security by disabling add-ons
Many browser hijackings come from add-on software, also known as browser extensions, browser helper objects, or toolbars. These items can improve your experience on a website by providing multimedia or interactive content, such as animations. However, some add-on software can cause your computer to stop responding or display content that you don't want, such as pop-up ads. Internet Explorer 10 and Internet Explorer 9 warn you in the notification area of your browser if an add-on is slowing down your computer. You can also view the add-ons that you already have installed and disable the add-ons that you don't want by clicking the gear icon, and then clicking Manage add-ons.

Security with HTTP

Secured HTTP
Let us discuss about what is HTTP? It is protocol to transmit the user request to remote server to open a website or web pages on internet. Its abbreviation is “Hyper Text Transfer Protocol” (HTTP) commonly used in internet browsers to open a website in the browser window. Actually when you type a website name in the browser, the HTTP protocol transfer your website name to the remote server eventually to open the web pages on your computer screen. HTTP protocol request send to the remote server through port 80 and your web address is preceded by http://websitename.

How Secure is HTTP?
Speaking In technical terms now a days HTTP protocol is not secured especially when you are making financial transactions your data can be stolen while it is transmitted to a web server. So we can conclude that sites that are using HTTP protocol are vulnerable for data theft. So, we need a alternative for HTTP to transmit the data in secured way.

You are Secure with HTTPS
HTTPSecure means HTTPS basically combination of HTTP and SSL (Secure Sockets Layer) protocol allows the user to establish a secured encrypted connection between user and the website hosted remote server. HTTPS is commonly used by websites with sensitive transactions like online payments or banking transactions or personal data. Example FACEBOOK and TWITTER social networking sites are using HTTPS protocol to keep secure their user data. When you type the name of the website https://websitename appear automatically.

HTTP use port 80
HTTPS use port 443

Warning: Don’t do any online payments or money transactions with websites without HTTPS. First check the website whether it is giving encrypted security or not, then only you proceed for transactions.

Security and safe computing

Are you allowing other people to use your computer or share files with others while you are browsing Internet. So, be careful there are computer criminals (called as hackers) who attack other people's computers with intension to steal personal information. These people can attack directly or by breaking into your computer through the Internet and steal your personal information this could lead to attack on your computer by sending malicious software to harm your computer. To avoid such attacks you can protect yourself by taking a few simple precautions.

Protect your computerThese are ways to help protect your computer against potential security threats:
  1. Update Windows regularly 
  2. Install Firewall software in your Computer 
  3. Install latest Anti-Virus 
  4. Install Spyware and other malware protection 
Update Windows automatically
Microsoft regularly offers important updates to Windows that can help protect your computer against new viruses and other security threats. To ensure that you receive these updates as quickly as possible, turn on automatic updating. That way, you don't have to worry that critical fixes for Windows might be missing from your computer.
  • To turn on automatic updating
  • Click to open Windows Update.
  • Click Change settings.
Make sure Install updates automatically (recommended) is selected. Windows will install important updates for your computer as they become available. Important updates provide significant benefits, such as improved security and reliability.

Under Recommended updates, make sure the Give me recommended updates the same way I receive important updates check box is selected, and then click OK. Recommended updates can address non-critical problems and help enhance your computing experience. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

Use a firewall SoftwareA firewall is software or hardware that checks information coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings. In this way, a firewall helps prevent hackers and malicious software from gaining access to your computer. Windows Firewall is built into Windows and is turned on automatically.

If you run a program such as an instant messaging program or a multiplayer network game that needs to receive information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the connection. If you choose to unblock the connection, Windows Firewall creates an exception so that the firewall won't bother you when that program needs to receive information in the future.

Use virus protection
Viruses, worms, and Trojan horses are programs created by hackers that use the Internet to infect vulnerable computers. Viruses and worms can replicate themselves from computer to computer, while Trojan horses enter a computer by hiding inside an apparently legitimate program, such as a screen saver. Destructive viruses, worms, and Trojan horses can erase information from your hard disk or completely disable your computer. Others don't cause direct damage, but worsen your computer's performance and stability.

Antivirus programs scan e‑mail and other files on your computer for viruses, worms, and Trojan horses. If any malicious code is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files.

Windows does not have a built-in antivirus program, so install a latest ant-virus software program and update the anti-virus regularly.

Use spyware protection
Spyware is software that can display advertisements, collect information about you or change settings on your computer, generally without appropriately obtaining your consent. For example, spyware can install unwanted toolbars, links, or favorites in your web browser, change your default home page, or display pop-up ads frequently. Some spyware displays no symptoms that you can detect, but it secretly collects sensitive information, such as the websites you visit or the text you type. Most spyware is installed through free software that you download, but in some cases simply visiting a website results in a spyware infection.

To help protect your computer from spyware, use an antispyware program. Windows 7 has a built-in antispyware program called Windows Defender, which is turned ON by default. Windows Defender alerts you when spyware tries to install itself on your computer. It also can scan your computer for existing spyware and then remove it.