Firefox 52 – How to Keep on Using Plugins

February 6th, 2017

Apparently, plugins are on their way out. Fortunately though, there’s still a way to tweak Firefox to keep your favorite plugins running.

Firefox 52 will be the first release version of the Mozilla Firefox web browser that will ship without support for NPAPI plugins. The only exception to the rule is that Firefox 52 will support Adobe Flash. All other plugins, Silverlight, Java, and all the others, won’t be supported anymore in the Firefox version. While plugin use is on the decline, scenarios exist where plugins are still required to use sites or services on the Internet.

Read the rest of this entry »

SMB Zero-Day Affects Windows 8, 10 and Server

February 3rd, 2017

If your system is displaying a blue screen, this might help to explain it …

The United States Computer Emergency Readiness Team (US-CERT) published a vulnerability note yesterday about a new zero-day vulnerability affecting Microsoft Windows 8, 10 and Server editions.

Read the rest of this entry »

Google Wants You to Use an Up to Date Version of Chrome

February 2nd, 2017

If you’re using Chrome 53 or an earlier version, get ready to be pressured to upgrade.

Google, just like Microsoft and probably any other company on the planet that produces software, wants you to use the most recent version of their products and not older versions. The company tries to keep Google Chrome users current through various means, but most importantly updating services that will check for and download Chrome updates automatically whenever discovered. Google announced yesterday that it plans to tighten the screws just a little bit for users on older versions of Chrome.

Read the rest of this entry »

Large Number of Android VPN Apps Insecure

February 1st, 2017

It turns out that a lot of Android apps that rely on VPN services, aren’t as private and secure as we were lead to believe.

Virtual Private Networks (VPN) have evolved from a technology used mostly by businesses to one that is used by more and more home users as well. Reasons are manifold, but improved privacy and security are certainly two key features that make a growing number of home users use VPN services and apps. Without going into too much detail; a VPN protects a device’s IP address as traffic flows through it instead of directly to the user’s system.

Read the rest of this entry »

Page Not Found? Load Archived Copies with Wayback Machine for Chrome

January 31st, 2017

The Wayback Machine isn’t just a very useful website, now it’s also a Chrome extension.

Wayback Machine is a new browser extension for Google Chrome that detects page error codes to suggest to access archived copies of the page. There is a saying that the Internet won’t forget a thing, and that it is difficult to impossible to remove content from the Internet completely. While that is the case, it is no rare occurrence that Internet users encounter deleted, redirected or temporarily unavailable pages or entire sites.

Read the rest of this entry »

Windows 10 Creators Update – New Options to Defer Updates

January 30th, 2017

Sometimes, it’s nice to be able to wait a day or two after a new update is released, just to see what kind of bugs other users are reporting before going ahead with the update.

Microsoft is working on improving the updating options of some editions of its Windows 10 operating system currently that provide users with better options to defer updates. The option to defer updates in current versions of Windows 10 is limited in several regards. First, it is only available if the Windows 10 edition is Pro, Enterprise or Education.

Read the rest of this entry »

Chrome to Throttle Expensive Background Pages

January 27th, 2017

Although this sounds like a good idea in many ways, the possibility of impacting notification services and messengers does seem like a serious drawback.

Google plans to roll out a change in Chrome Stable soon that will have the browser throttle timers in background tabs to improve battery life and browsing performance. The motivation behind the chance is that some pages consume a lot of CPU when they are in the background. Google mentions JavaScript advertisements and analytics scripts explicitly but it is not limited to that.
The core idea is to limit the processing power that background tabs get in Chrome once the feature lands.

Read the rest of this entry »

How to Change Firefox’s Sandbox Security Level

January 26th, 2017

Here’s an interesting trick …

One of the major improvements that comes along with Firefox’s new multi-process architecture is sandboxing to improve the browser’s security. The multi-process rollout is chugging along nicely, but it will still take at least months before it is enabled by default for all, or at least the majority, of Firefox Stable users. Electrolysis, Firefox’s multi-process architecture, is the prerequisite for Firefox’s sandboxing feature as it makes use of child processes to establish security boundaries.

Read the rest of this entry »

Windows 10 Version 1607 Update KB3211320

January 25th, 2017

This latest update is definitely a big one, but so far, there isn’t much information available to describe exactly what it does.

Microsoft has released KB3211320 for Windows 10 Version 1607 today through Windows Update and the Microsoft Update Catalog service today. The Knowledgebase page of the update is not live yet, which makes it difficult to find out what it is all about.

Read the rest of this entry »

Microsoft – Windows 10 Hardening Against 0-Day Exploits

January 24th, 2017

Windows 10 does indeed do a fine job with security issues … but I still wish they could learn to resist the temptation to tweak my Start Menu and Task Bar every three or four upgrades or so.

One key focus of Microsoft when it comes to promoting the company’s latest operating system Windows 10 is to hammer home that Windows 10 is better for security. The company published a blog post recently on the Microsoft Malware Protection Center blog which exemplified that by analyzing how Windows 10 handled two 0-day exploits, or better, how it protected customer systems from those exploits.

Read the rest of this entry »