Disabling potentially vulnerable browser plugins
Hackers often program malicious code to exploit weaknesses in browser components such as JavaScript
, plugins and extensions including Flash, PDF
, as well as JavaScript
to infect users' computers. If you need to view the contents of an infected site without using the cached version, you should disable these components first. By doing this, you will significantly reduce the risk of your computer becoming infected when viewing pages containing malware.
The plugins most frequently exploited to attack computers can be disabled as follows:
Microsoft Internet Explorer 6 — 9
Increasing overall browser security:
Tools —> Internet Options —> Security —> Custom level, select "high", click "reset", then "ОК".
Disabling
JavaScript:
Tools —> Internet Options —> Security —> select the "Internet" icon —> Custom level —> Scripting (scroll down to see this) —> Active scripting —> Disable.
Disabling
Flash, PDF and Java:
Tools —> Add-ons —> select "Toolbars and Extensions" in the window on the left —> then "Shockwave Flash Object", "Adobe PDF Link Helper", "Java" (the companies may vary) on the right —> Click "Disable" at the bottom.
Mozilla Firefox 4
Disabling
JavaScript:
Firefox —> Menu —> Preferences —> "Content" —> Clear the "Enable JavaScript" checkbox.
Disabling
Flash and PDF:
Firefox —> Add-ons —> Plugins —> Click "disable" next to Shockwave Flash and Adobe Acrobat.
Disabling
Java—applets:
Firefox —> Add-ons —> Plugins —> Click "disable" next to the Java Console option (disable each option if there is more than one).
You can install the
noscript
add-on forFirefox
which lets you disable multiple components at once.Opera 11
Disabling
JavaScript
:Tools —> Preferences —> Select "Content" then clear the "Allow JavaScript" checkbox.
Disabling
Flash
andPDF:
Type "opera:plugins" in the address bar then press "Enter" —> click "Disable" next to the Shockwave Flash and Adobe Reader options.