Computers Windows Internet

Protect: block dangerous pages. Strong protection for your browser How to protect your browser from viruses

Today, there are many browser plugins that promise to protect user privacy. In this article, we will look at the most popular browser plugins that protection from advertising on the Internet.

Block ads, scripts and pop-ups with AdBlock Plus

Ad blockers and script blockers give you control over your browsing experience. They allow you to block ads on the sites you visit and prevent the execution of scripts and widgets that send user data to no one knows where.

But if you don't know how to use these tools, they can interfere with your browsing experience, rendering them unusable until you figure out what to allow and what to block. In addition, by blocking ads, you can have a pretty big impact on the site and the people working on it.

AdBlock Plus ( Firefox/Chrome/Safari) blocks banner ads, pop-ups, video ads, and more. It prevents visits to domains hosting malware and disables third-party tracking cookies and scripts. We believe it combines ease of use and whitelisting with automated management to make it a tool anyone can use. Advanced users can get their hands on and experiment with the different subscription lists and active list settings they use.

Alternatives:

In our opinion Adblock Plus is the best choice, but there are several other plugins that do the same.

Consider other options internet ad protection:

  • uBlock Origin for Chrome and Firefox is supported by the original developer. The plugin is just as powerful as AdBlock Plus. Perhaps even more powerful, because unlike ABP, it gives you more control over what to block and what to allow. It also takes up less system resources and does not cause problems like ABP . whose creators are paid by some large companies to ensure that their ads fall within the "acceptable advertising" policy. The only reason uBlock Origin isn't our favorite is that it's a bit difficult for beginners and blocks more than ABP. So first you need to understand it in order to customize it to your needs. And second, ABP has features like Facebook scraping, hiding YouTube comments, and a lot more that uBlock Origin doesn't... at least until you're an advanced enough user to do it yourself. If you consider yourself an advanced user, remove ABP and install uBlock Origin;
  • NoScript( Firefox) and ScriptSafe ( Chrome, formerly ScriptNo): both disable script execution on pages until the user whitelists them. They block the execution of Java, JavaScript, Flash and other components. They are powerful, but very aggressive and interfere with many sites. If you're going to use them, then be prepared to understand the scripts on every site you visit to figure out which ones make the site work. Other than that, AdBlock Plus already does this ( and less aggressive), you just need add correct filters.

If you don't use the extra features of AdBlock Plus to trim various YouTube junk or block certain elements, try uBlock Origin. It will do the magic - it will reduce the amount of memory consumed by the browser, and as a result you will get a more powerful and customizable tool for protecting against ads on the Internet for free. Although you have to tinker with it to make it work exactly the way you want.

Blocking all tracking requests with Disconnect

Includes anti-tracking and anti-cookie extensions.

Disconnect Private Browsing ( Firefox/Chrome/IE/Safari) is our choice because it protects against tracking, malware, and malicious ads, provides secure Wi-Fi, and provides bandwidth optimization functionality that is simply not available in other tools. It blocks tracking cookies and gives you control over all scripts and site elements from an easy-to-use dashboard.

Disconnect can protect you even when malware embeds its ads on popular pages or the ad network is infected with embedded malware. The plugin also protects against social media tracking such as Facebook, Google+ and Twitter, which use the browser to collect data about you even outside of their social platforms. Finally, Disconnect protects you when an attacker can use stolen cookies to access personal data without the need to steal a password.

Alternatives:

Disconnect is our favorite of the bunch, but there are other browser extensions that do the same:

  • privacy badger( Chrome/Firefox) - since he is new to this field, he tried to take the best from all previously created plugins. Acts too gently - blocks unwanted activities and creates a "black list" when bad behavior is observed, instead of blocking certain sites, cookies, and pop-ups. This makes it more lightweight, but it provides a bit less protection, at least as long as it learns from your behavior. You also get an easy-to-use button on the toolbar, which gives you a completely clear view of recording information about you. System " Green / yellow / red» shows whether you are tracked through sites or not;
  • Do Not Track Me Firefox/Chrome/IE/Safari): offers a drop-down browser toolbar that shows which tracking cookies and scripts are being loaded on the site, and allows you to turn them off completely. Has a friendly interface. It also leaves plugins and scripts enabled until you turn them off. Disconnect is much more powerful and functional, Do Not Track Me is suitable for those people who want to download protection from ads on the Internet and disable elements selectively;
  • (ghostery) Firefox/Chrome/Safari/IE): Just like other browser extensions, Ghostery blocks tracking cookies and scripts during download. Displays a list of blocked items so you can see if blocked items are harmless. Ghostery's database is huge and provides the ability to block everything or something specific. Unfortunately, Ghostery has trouble selling information to advertisers, so you might want to stay away from it.

One could argue that Disconnect, Do Not Track Me, and Ghostery do the same thing, but we still think Disconnect is the most reliable of the three. We love the Privacy Badger approach" learn as you go“, but we cannot argue that it will provide less protection when entering the tracking zone than any other plugin. Speaking of which, the new version of Disconnect is only available for Firefox and Chrome, so if you prefer Safari, IE, or Opera, we'd suggest Do Not Track Me.

It essentially comes down to personal preference: what doesn't get in the way of browsing, and what works best in the browser you use the most. So if one plugin doesn't work, don't be afraid to try another one.

Disconnect Desktop and Mobile Security

The Disconnect browser tool is worth downloading and we recommend it for those who want privacy or speed up their web browsing. If you want to go even further new desktop package Disconnect Private Browsing, which we mentioned above, with its own proxy and VPN, will ensure the security of your web surfing. It checks connections against a list of malware embedded in ad networks, monitors tracking tools for known malicious hosts and sites, and then simply blocks them.

The free version of the Disconnect desktop package includes the browser plugins we mentioned above with its own search service and a basic proxy that keeps web surfing secure. When you upgrade to Disconnect premium for $5/month or $50/year, you can get these features along with mobile apps for iOS and Android.

This is a great service Internet advertising protection and, frankly, there is no alternative to it. However, the premium price may be too high for some people. We think you should sign up for a VPN, especially when you're in a Wi-Fi zone or using untrusted networks, but Disconnect is designed to keep you private and secure. For many people, the Disconnect extension is all it takes to protect.

Additional privacy tools

HTTPS Everywhere ( Firefox/Chrome) is required no matter what security you choose to use. Once installed, the extension will check the connection using SSL and try to find secure versions of the sites you visit. This is a great way to protect your web surfing.

Virtual Private Network (VPN) encrypts all your internet traffic and offers the best possible protection from prying eyes. Look for a provider that keeps only the minimum required logs for troubleshooting, offers strong encryption, is well received by users, and provides many options. Don't rush to any offshore VPN just because your VPN provider is in a distant country. If you are just looking for a free service to keep yourself safe while you surf the internet and you are not ready to try a full paid VPN service ( or your own), try Hideman or Tunnelbear .

Antivirus utilities important for security protection. Try to avoid suspicious sites, follow the rules of hygiene on the Internet, and keep your antivirus tools up to date.

Other Security Tools You May Need

We've covered the most important and necessary privacy and security tools, but there's always one more step you can take to make sure your messages aren't intercepted and read by third parties. Here are some more tools for the best protection against advertising on the Internet.

tweet

Introduction

… the problem is not so much the scammers, but the fact that the news appeared only now, 27 years after the invention of the first browser and 20 years after the appearance of the first ActiveX extensions for Internet Explorer (if not earlier, I may be wrong). There is a false impression that It used to be better.

I remember watching a movie about life in an alternate reality where there was no concept of lies. The protagonist discovers that one can benefit by saying something that is not true. So it is now: as if no one guessed that if the expansion maybe merge the info, it is will do!

The possibility of data theft is so obvious and it seems so strange to mention it now that I had a suspicion: am I now in the correct Universe? After all, when we install browser extensions, a warning appears:

And suddenly the discovery - turns out, extensions that access all sites in a row can leak all user input to their owners. Correspondence, passwords, bank card numbers - anything!

In the past, people installed Java applications on their phones by clicking on a link in an SMS, ostensibly to view an MMS message. These programs could only do one thing - send SMS to paid numbers, before asking permission from the owner of the phone. And after all allowed, and lost money! APK programs for Android and extensions are now being installed, and warnings about the consequences of installing extensions for browsers and programs have become more clear.

How to protect your browser and data

I offer a list of measures that reduce the chance of sending information to the wrong place:

  1. Run a scan with the program. It is not designed to 100% detect harmful extensions, but it will remove most of the known ones.
  2. Go to the list of installed extensions (in Chrome, the menu item "Additional tools" - "Extensions", in Mozilla Firefox, the item "Add-ons") and check if there are any extensions that you do not know. Found - delete. Browsers work fine without extensions. Although there are useful ones.
  3. Do not install any flash players and browser updates offered on sites. Modern browsers update themselves.
  4. To work with finances, use a separate browser that is not prescribed in the system. It is more difficult for viruses to infiltrate such browsers. For example, portable Mozilla Firefox in Russian you will find listed on PortableApps. Google Chrome and Yandex Browser do not have an official laptop, at least run all sorts of Sberbank online in incognito mode - all extensions are disabled there by default.
  5. Put the program unchecked, which will uncheck advertising extensions during installation of programs.
  6. Keep your antivirus databases up to date. Usually they update themselves, but you never know. Antiviruses are useless when looking for fraudulent extensions, but Trojans will.

One hundred percent protection does not exist, but the level of security will increase.

Multiple Predictions

There are many ways to steal information. I'll write in advance so you know. You will grin condescendingly at the sight of another panic: you already knew for a long time!

Photo

  • Some people will be shocked when it becomes known that photos not taken through the standard camera application of the phone can become public. The fact is that sometimes the processing does not take place in the phone, but on the servers of the authors of the camera programs and the photos may remain somewhere.
  • Unexpectedly, it turns out that image processing services do not delete photos, but carefully store them. And someday everyone will see photos of cats.
  • It is already known, but I will mention: in Windows it is very easy, including covertly. So the tape over the eye of the camera is, alas, a necessary measure.

Sound

You can also record your conversations at the computer. Even if only headphones without a microphone are connected, theoretically this is possible. Fortunately, computers till do not recognize speech well, so attackers till they cannot put wiretapping of an unlimited circle of people “on stream” in order to fish out logins, passwords and PIN codes spoken aloud. I repeat - for now can not.

Messages

  • Unexpectedly (surprise!) all your online correspondence can be stored forever and leaked to those who are interested in it, including scammers. For example, the popular QIP was hacked.
  • This also applies to SMS. For private conversations, use it - perhaps nothing easier to use than his secret chats has yet been invented.

Clipboard

Do you like to copy-paste passwords from the "secret" file "passwords.doc" lying on the Desktop? Trojans do not need to look for such documents, it is enough to track changes in the Windows Clipboard. By the way, now browsers are not able to automatically read its contents, but if such an opportunity is found, an open tab with a malicious site will be enough to collect confidential data.

Saved passwords in browsers

This is convenient for both the user (no need to re-enter passwords) and attackers (password files are in the same place and can be easily decrypted).

People say their own passwords

Periodically, in the comments under popular posts, I am asked questions and asked to answer e-mail, and they indicate the address and password. Why?!

Something else

I won’t be surprised if in the future, when 4K webcams become popular, viruses will peep into the reflection of the pupils of the typed passwords ...

Summing up

  1. If you run the program, it can steal your logins and passwords. Don't run everything.
  2. If you see a warning about what an app can do, it really can. Do not install add-ons and updates for browsers that are offered to you on sites. Be prudent read the reviews. If in doubt, ask knowledgeable users for advice. You can ask me.

Any parent wants to protect their child from bad things in this world. The Internet is no exception. The Internet itself is not bad, it is a mirror in which human reality is reflected. Are there good things on the Internet? There is! But there is also bad ... for children.

This article is designed to help parents protect their children from inappropriate content online using filters. And for free! All you need is a desire. Since a good defense is a layered defense of several stages, our protection of children will also be multi-stage ... the enemy will not pass.

Regardless of the level of your computer knowledge, you will have to learn and understand a couple of points.

1) Computers operate with numbers among themselves, and site addresses for computers are also numbers, but it’s easier and better for a person to operate with meaningful text. DNS is a converter of "text" for people (such as rambler.ru) into "address-numbers" (such as 81.19.70.1) and vice versa. The first stage of protecting children from inappropriate content will be based on the fact that there are DNS servers that, during the "transformation", can also filter. In other words, if a child visits the yandex.ru site in a browser, then this good site in the DNS will be converted to its computer-numeric-address (IP address). But if a child voluntarily or unwittingly gets to sex.com, then such an address will NOT be converted to his computer-numeric-address (IP address), but to an address where there will be a warning about the inadmissibility or that such a site is not on the network.

2) This stage will protect the child from unwanted search results. It is necessary to use Yandex with the Family Filter as the home page in all browsers on all computers available to you.

3) Third Party Free Software Solutions and Services from Internet Service Providers.

DNS protection.

On the Internet, from free and serious protections for children through DNS filtering, we will take 2 representatives: Yandex.DNS and OpenDNS FamilyShield (OpenDNS Family Shield). Why 2?

1) You never know who of them will start to "stupid", and timeouts during conversion affect the speed of your work on the Internet, regardless of your tariff with the provider.

2) One head is good, but two is better.

3) In many operating systems there are 2 fields for specifying DNS servers.

Before proceeding to prescribing DNS servers-defenders, you need to decide where it is better to register our defenders. DNS servers can be registered on the terminal device - a computer, laptop, tablet, smartphone, or in your router node (if any), which brings your home network to the Internet.

Each method has pluses and minuses.

1) Register on the router - access point. Your computers receive network settings from your home router via DHCP. The router will instruct all your devices and devices visiting friends to use it as DNS. And he will use the higher DNS servers-defenders. In this scheme, friends will be protected too.

2) But the above scheme is bad when your child leaves with his smartphone or tablet in a cafe with friends and there he will not be protected by someone else's router. Therefore, prescribing defenders-DNS on the terminal device has its own plus.

It is up to you to decide whether to protect yourself through your access point and / or through the end device.

Access point.

1. Enter the IP address of the router in the browser to enter the admin panel.
2. Enter your username and password.
3. In the router management menu, find the DNS server settings.
4. Enter the Yandex.DNS address 77.88.8.7 as the Primary DNS server and save the changes. In the Secondary DNS server field, enter the OpenDNS FamilyShield address 208.67.222.123.

On the computer.

Windows XP.
1. Open the Start menu -> Settings -> Control Panel -> Network Connections.
2. Right-click on the desired network connection and select Properties.
3. In the connection properties window, select the Internet Protocol (TCP/IP) item and click the Properties button.

5. Enter the Yandex.DNS address 77.88.8.7 as the Preferred DNS server. In the Alternate DNS Server field, enter the OpenDNS FamilyShield address 208.67.222.123. And save the changes with the OK button.

Windows 7.
1. Open the Start menu -> Control Panel -> Network and Internet -> Network and Sharing Center ->
2. Right-click on the desired network connection and select Properties from the menu that appears.
3. In the connection properties window, select Internet Protocol Version 4 (TCP/IP) and click the Properties button.
4. In the window that opens, select Use the following DNS server addresses.
5. Enter the Yandex.DNS address 77.88.8.7 as the Preferred DNS server. In the Alternate DNS Server field, enter the OpenDNS FamilyShield address 208.67.222.123.

Windows 8.
1. Hover your mouse over the Start menu (lower left corner of the screen), when the menu appears, right-click on it and select Control Panel.
2. Open Network and Internet -> Network and Sharing Center -> Change adapter settings.
3. Right-click on the desired network connection and select Properties from the menu that appears.
4. In the connection properties window, select Internet Protocol version 4 (TCP/IP) and click the Properties button.
5. In the window that opens, select Use the following DNS server addresses.
6. Enter the Yandex.DNS address 77.88.8.7 as the Preferred DNS server. In the Alternate DNS Server field, enter the OpenDNS FamilyShield address 208.67.222.123.

MacOS X.
1. Go to System Preferences -> Network.
2. Select the network for which you want to configure DNS (AirPort, Ethernet).
3. Click the Advanced button, go to the DNS tab.
4. Enter the Yandex.DNS address 77.88.8.7 and save the changes.

Ubuntu.
1. Click the network connection icon, select Edit connections from the list.
2. Select the network for which you want to configure DNS and click Edit.
3. Click the IPv4 Settings tab, in the Method group, select Automatic (DHCP) addresses only.
4. Enter the Yandex.DNS address 77.88.8.7 in the Addresses field (Addresses, DNS Servers) and save the changes.

On a smartphone or tablet.

Android 4.x
1. Go to Settings, select Wi-Fi.
2. Long press (press and hold until a dialog box appears) select the desired Wi-Fi network.
3. In the dialog that appears, select Configure network.
4. Check the Show advanced settings checkbox at the bottom.
5. In the IP Setting item, select Static from the drop-down list.
6. Enter the Yandex.DNS address 77.88.8.7 in the DNS 1 field. In the DNS 2 field, enter the OpenDNS FamilyShield address 208.67.222.123.
7. Click Save.

Apple iOS.
1. Go to Settings -> Wi-Fi, click on the arrow next to the network you use.
2. Find the DNS item and enter the Yandex.DNS address 77.88.8.7 into it.

Search engine protection.

This stage will protect the child during the search for information. You can use Yandex Family Search, which filters search queries and does not return results that are not intended for the child. Protection is based on the fact that, by default, all new open tabs in the browser use the Yandex search engine with the Family filter as the home page. Most likely, the child will not switch to other search engines, but will use the one already offered with filtering.

Google Chrome.
1. Enter the browser settings: Top right icon of three horizontal lines -> Settings.
2. Select: Start Group -> Next Pages.
3. Click Add, in the Add page field, enter http://family.yandex.ru
4. Click OK

Mozilla Firefox.
1. Enter the browser settings: Edit -> Settings.
2. In the General tab, select: When Firefox starts Show the home page.
3. In the Home page field, enter: http://family.yandex.ru

Opera.
1. Enter browser settings: Opera -> Settings -> General settings.
2. On the Basic tab, select: At startup Start from the homepage.
3. In the Home field, enter: http://family.yandex.ru
4. Click OK.

Protection with free programs and browser plug-ins.

This section discusses software products that can help a parent free of charge to protect the child's psyche from the horrors of the Internet and make it white and fluffy.


I hope these free solutions will protect you and your children!

How to protect the browser from viruses? and got the best answer

Answer from Red Dead ?[guru]
It is called a firewall or a firewall, it is included as a module in the package of many antiviruses. For example,
Red Dead ☭
(221929)
Might as well not sweat

Answer from 2 answers[guru]

Hey! Here is a selection of topics with answers to your question: How to protect the browser from viruses?

Answer from Crystal[guru]
Nod32 - firewall + antivirus. Catches everything that others do not catch.



Answer from Maxim Sokolov[newbie]
no no you must have a good browser like amigo


Answer from Yatiana[guru]
Everything in our lives has to be paid for. However, we are left with a choice - to pay or pay. Therefore, before once again climbing into the world wide web, you need to think about precautions, and for this you need to answer a few questions. What is an antivirus program and what is a virus? How can a virus get into a computer? Is it possible to work with a computer without an antivirus program? Which antivirus to choose? Is antivirus a panacea?
The only question that can be answered unambiguously and clearly is that an antivirus is necessary. If there is no antivirus on the computer, then virus creators have the opportunity to access computer data: games, documents, messages, passwords, etc.
Computer viruses are small programs that spread from one computer to another and affect the operation of the operating system.
A virus can damage or delete data on your computer, destroy everything on your hard drive, and spread to other people via email.
Viruses are most easily spread through email attachments. That's why you shouldn't open attachments if you don't know the senders. Viruses can spread under the guise of greeting cards, funny pictures, video and audio files. They can be accidentally downloaded from the Internet with unlicensed software, as well as other files. The cause of the virus can be ftp file servers, local networks, "public" computers or random users of the computer.
Here are the main signs that a computer is susceptible to a virus attack:
1) The computer is running slowly;
2) The computer often locks up and does not respond to requests
3) The computer often needs to be restarted
4) The computer often reboots on its own
5) Applications that are installed on the computer do not function correctly
6) Drives or discs not available
7) Document cannot be printed
8) Error messages appear frequently.
An anti-virus program is designed to detect and subsequently remove computer viruses and other malicious programs, prevent their further spread, and restore those programs that were infected with them.
There are many antivirus programs; the names of many of them are well-known (Norton Anti-Virus, Kaspersky Anti-Virus, DrWeb, NOD32, etc.). Each antivirus has advantages and disadvantages. There are no perfect antiviruses, as viruses are constantly being improved to bypass defense systems.
Anti-virus programs are able to recognize and then destroy only those viruses that they know. Antivirus is able to recognize a particular virus only if it has it in its database. Specialists monitor the appearance of viruses around the clock, neutralize them and send updates to all subscribers. Therefore, it is extremely important to update your antivirus daily - after all, this is a kind of war between hackers and defenders.
To prevent the threat of computer virus infection, you should install an antivirus, update it in a timely manner, and remember the rules when working on the network. It is much easier to prevent than to grieve over stolen funds or lost data.
The main user mistakes: the lack of a good antivirus or the antivirus is expired and not updated, not knowing even the very basics of OS and PC security or their obvious neglect.

A significant number of problems, especially regarding the appearance of pop-up ads or the substitution of search results, are associated with the work of extensions in the browser. And at the same time, these same extensions can monitor the characters you enter, redirect to other sites, and more.

Use only the extensions you really need and also check the list of extensions. If, after installing a program and launching a browser, you are prompted to enable an extension (Google Chrome), an add-on (Mozilla Firefox) or an add-on (Internet Explorer), do not rush to do this: think about whether you need it or for the installed program to work, or is it something doubtful.

The same goes for plugins. Disable, or better - remove those plugins that you do not need in your work. For others, it may make sense to enable Click-to-play (start playing content with a plugin on demand). Don't forget about browser plugin updates.

Use anti-exploit programs

If a few years ago the feasibility of using such programs seemed doubtful to me, today I would still recommend anti-exploits (Exploit is a program or code that uses software vulnerabilities, in our case, the browser and its plug-ins to carry out attacks).

Exploiting vulnerabilities in your browser, Flash, Java and other plug-ins is possible even if you visit only the most reliable sites: attackers can simply place ads on it for a fee, seemingly harmless, the code of which, among other things, uses these vulnerabilities. And these are not fantasies, but what is really happening and has already received the name Malvertising.

Of the products of this kind available today, I can recommend the free version of Malwarebytes Anti-Exploit, available on the official website https://ru.malwarebytes.org/antiexploit/

Scan your computer with more than just antivirus

A good antivirus is great, but it would still be more reliable to also scan the computer with special tools to detect malware and the results of its activities (for example, an edited hosts file).

The fact is that most antiviruses do not consider certain things on your computer to be viruses, which in fact harm your work with it, most often the Internet.

Be careful and considerate

Try to use official and trusted sites, as well as check questionable information using search engines. I won’t be able to fit all the principles in two paragraphs, but the main message is to approach your actions meaningfully, or at least try.