Play it safe with the right browser security settings

被引:0
|
作者
Spanbauer, Scott
机构
来源
PC World (San Francisco, CA) | 2003年 / 21卷 / 09期
关键词
Computer software - Personal computers - Web browsers;
D O I
暂无
中图分类号
学科分类号
摘要
A report on the browser security settings to eliminate dangerous programs or scripts was presented. The dangerous code in pop-up pages appears as an ActiveX control that presents itself for approval before downloading. It was emphasized that to eliminate these hazards in Internet Explorer, the settings for ActiveX controls should be checked.
引用
收藏
相关论文
共 50 条
  • [41] A right to play
    Guldberg, H
    NEW SCIENTIST, 1999, 163 (2202) : 47 - 47
  • [42] Analyzing the Browser Security Warnings on HTTPS Errors
    Wang, Congli
    Lin, Jingqiang
    Li, Bingyu
    Li, Qi
    Wang, Qiongxiao
    Zhang, Xiaokun
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [43] Residue Objects: A Challenge to Web Browser Security
    Chen, Shuo
    Chen, Hong
    Caballero, Manuel
    EUROSYS'10: PROCEEDINGS OF THE EUROSYS 2010 CONFERENCE, 2010, : 279 - 291
  • [44] Browser Security: Lessons from Google Chrome
    Reis, Charles
    Barth, Adam
    Pizano, Carlos
    COMMUNICATIONS OF THE ACM, 2009, 52 (08) : 45 - 49
  • [45] CorbFuzz: Checking Browser Security Policies with Fuzzing
    Shou, Chaofan
    Kadron, Ismet Burak
    Su, Qi
    Bultan, Tevfik
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 215 - 226
  • [46] Browser Security Comparison Using Cookie Analysis
    Han, Claire
    Niyaz, Quamar
    Javaid, Ahmad
    2024 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY, EIT 2024, 2024, : 256 - 261
  • [47] New Hands-on Labs on Browser Security
    Du, Wenliang
    Yang, Li
    Kizza, Joseph
    Yuan, Xiaohong
    PROCEEDINGS OF THE 45TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION (SIGCSE'14), 2014, : 717 - 717
  • [48] Identity Armour: User Controlled Browser Security
    Copeland, Ross
    Davidson, Drew
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I, 2020, 335 : 474 - 480
  • [49] Vetting browser extensions for security vulnerabilities with Vex
    Bandhakavi, Sruthi
    Tiku, Nandit
    Pittman, Wyatt
    King, Samuel T.
    Madhusudan, P.
    Winslett, Marianne
    Communications of the ACM, 2011, 54 (09): : 91 - 99
  • [50] Eye Tracking Analysis of Browser Security Indicators
    Darwish, Ali
    Bataineh, Emad
    2012 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND INDUSTRIAL INFORMATICS (ICCSII), 2012,