Return to Main Menu || Page 1 < Page 2

How to secure your PC - Online safety tips and tutorials

6. Browser security addons

I recommend Google Chrome. It supports many extensions and it's been proven to be more secure than other browsers in hacking contests. Download Google Chrome
Having a great internet browser is not the end of story. You should consider installing the following extensions:

WOT (Web Of Trust) - for Chrome - for Firefox
Users and administrators of WOT constantly blacklist suspicious and malicious sites. This means if you visit a site that was marked as malicious by many users, the access will be blocked and you will stay safe. WOT protects not only against sites that contain malware but also sites that promote scam or steal personal information.

HTTPS Everywhere - for Chrome - for Firefox
This extension will force the connection between you and a website to be secure, if the website supports it. This will make it hard or impossible for others to temper with data transmitted between you and the website you're browsing.

TrafficLight - for Chrome - for Firefox
This extension is provided by BitDefender security company. It will warn you when you visit a known malicious website. The main difference between TrafficLight and WOT is that WOT is maintained by ordinary users and WOT administrators, while TrafficLight is maintained by security professionals.

LastPass - for Chrome - for Firefox
This extension will store your passwords,offer you stronger passwords and sync it to cloud so you can install LastPass extension on another computers and have your passwords ready. You no longer have to use the same password for all websites, or short passwords, for the sake of convenience. This extension will remember the long and unique passwords for you. You only need to remember one Master Password so you can log into LastPass extension before using it. Make sure to use a strong Master Password with at least 12 characters and made of upper case,lower case,digits and symbols.

7. Block malicious websites - Norton DNS - [visit here]

When you visit a website like, your browser connects to your internet service provider's DNS server in order to find the exact "internet address" of Your internet service provider's DNS server does not block malicious websites. You can use Norton's DNS which will block access to known malicious websites. This requires a one time configuration on network adapter. The following video shows the process step by step.

8. Sandboxie - [Download]

When you open the internet browser through Sandboxie, it creates an isolated part on your hard drive and loads the browser to that isolated area. The changes made by you to your browser or changes made by your browser to your operating system are erased when you close Sandboxie. If you visit a malicious website and it installs malware or bad extensions, you can simply close Sandboxie to erase the changes.
You can run any program with Sandboxie, not just internet browsers. It provides a great level of security but novice users may find it somewhat complicated. The following video demonstrates how to install and configure Sandboxie.

9. Things to avoid

Registry Cleaners
Most of these programs make it look like your computer is in trouble because of "registry errors". You should ignore them.

Rogue Warnings
Websites often get hacked and they serve malicious content. If you ever visit a website and receive a warning that your computer is infected or it has errors that need to be fixed ASAP, it is guaranteed to be a scam. Do not call any number they provide, do not click anywhere on the warning sign,do not install anything. If you can not close the website then close the browser.

Email attachments
Unless the email is from a trusted person or you expect the attachment, it is best not to open it. Do not open any attachments from individuals you do not know,from companies that claim to send you money,from lottery services claiming that you're the winner,from someone claiming to be FBI or CIA. If you receive a suspicious email from your friend and it's designed in a way to make you want to open a link or an attachment(clickbait) you should approach it with caution. Contact your friend and find out if he actually sent you an attachment.

10. Vulnerable programs and alternatives

Previously we discussed Malwarebytes Anti-Exploit and what it does to prevent malware from using Vulnerable software's security hole to take over your system. The truth is, security programs are not 100% perfect. You should always avoid installing programs that are commonly exploited by hackers. Find alternatives if you can.

Unless you really need Java, it is best not to install this at all. Simply having it installed puts your computer at risk. It doesn't always update itself on timely manner and it is one of the most commonly exploited programs. If you have a Vulnerable version of Java, all it takes is to visit a website that serves an exploit and your computer will be hacked. If you aren't sure whether you need Java I suggest uninstalling it and visiting the websites you normally use to see if they function properly. You can always re-install Java if you need to.

Adobe Reader
This is another program that is very often exploited by hackers. Adobe Reader is used for reading PDF documents. Unless you read long PDF books and appreciate all the little details provided by Adobe Reader, it is best to uninstall it and use your internet browser to open PDF documents.
The following video shows how to uninstall Java and Adobe Reader, and configure your internet browser to be the program that opens PDF documents.

Page 1 [Go Back...]