26 Jun 2011

10 Tips for Safe Browsing

Already secure is our way of browsing or surfing in cyberspace, we need to know that 90% of cyber crime is done via the Internet. Many people who do not know that the browser they use to explore the virtual world, many leaving a trail of activity, lots of data that can be obtained from the browser to collect data about a person, as well as social networking sites, can provide information harmful to the parties irresponsible, for example, telephone data, such as the status of important ga "Again bete nih at home", it could be fun to invite people to come to the house.
When we inadvertently learned that we can leave various traces, as well as confidential information in the browser and the virtual world, then we should also think about how to remove or disguise the trail so that no one else is collecting our personal information. Let us refer to some of the following tips to become more and more secure browsing.
Tips 1: Clear History
Safe browsing tips are commonly used to eliminate the browsing activity is delete history, cookies, autocomplete on the form, and whatever is seen as a browsing trail. If it is difficult to do manually, we can use a tool that can do it automatically. One such tool is CCleaner (http://www.piriform.com/ccleaner). CCleaner is a free tool to clean up the system, including clearing the cache on a variety of popular browsers, like Internet Explorer, Firefox, Google Chrome, Safari and Opera.
Tips 2: Private Browsing
The first browser that has this feature is the Safari in 2005, then after it emerged Google Chrome with Incognito feature, and Internet Explorer with features In-Private Browsing, Mozilla can be accessed on the menu select Tools - Start Private Browsing or press Ctrl + Shift + P. During use the Private Browsing mode then the browser will not save browsing history, search, download, web forms, cookies and temporary internet files on our computer.
Tips 3: Flush DNS
Although already using private browsing, the actual computer is still browse our store trace information in the DNS cache. Cache was created to accelerate access to certain websites when calling back. We can see the contents of the cache by typing this command in the Command Promt (to run the Command Prompt, click Start, click Run, type cmd).
Ipconfig / displaydns
Based on the cache information, one can know the URL we've ever access. To access it, simply type this command on the Command Prompt:
Ipconfig / flushdns
Tips 4: Proxy Server
While browsing our automated computer's IP can be seen from the other party, to disguise it we can use a proxy server. With a proxy server then access the website that we will only detect the IP Proxy. Proxy Server acts as an intermediary. If we access a particular website through a proxy server, then each page will go to the proxy server first. However kekuranga using proxy servers are also available is Internet access speed is slower than without a proxy, because every request and response should be through a proxy server, but for certain cases can even be faster if the proxy server has cached a page that has been our access.
Tips 5: Delete Flash Cookies
Many websites use cookies to store its data, especially web-web-rich user interfaces, such as flash, silverlight, ajax and the like. Locations flash cookies can be accessed by typing the following command:
% \ Appdata% \ Macromedia \ Flash Player \ # SharedObjects
Address above is written in Windows Explorer. After that, the show immediately flash cookies folder, to delete delete the entire folder that shows websiet address on the flash cookies.
Tips 6: Username and Password
Many web applications that require registration and login to access certain features. By registering, users generally need to enter e-mail address, specify a username and password. The more frequent e-mail address is exposed, the greater the likelihood of spam coming into your e-mail. It is therefore not uncommon to users who have "experienced" to be spam and forced subscription alternate e-mail.
The solution to this problem, among others, makes e-mail address specifically to accommodate the "trash" and use it just for registration. Adalh another solution using the username / password that is shared freely, so we do not need to do regisrasi. One website that provides such a service for posting the username / password used to log into various websites is BugMeNot (http://www.bugmenot.com)
Tips 7: Social Networking
The easiest way to find out other people's personal information is through social networking sites like Facebook, Twitter, Foursquare and the like. Sometimes some of us to enter personal information such as date of birth, e-mail address, telephone number and home address, and freely exposed so that anyone could see. These data can be misused by others and may potentially be exploited by strangers than by our friends. Status information or the location where we could also backfire sometimes make our own. It's happened several cybercrime cases or other criminal activity due to these social networking sites. The solution to this set privacy settings so that the information is not carelessly exposed, do not write status that could invite the parties could abuse.
Tips 8: Anonymous User
When we are active in the discussion forums, blogs or mailing lists, users can contribute, for example, write comments and questions. What we write will be a trail that is not easily removed because we do not have control over your website / blog. The trail has the potential to be read or found by anyone via search engines. The solution is to create aliases or anonymous users to disguise our true identity. However, for certain cases such as at school or university alumni community, not feasible when we use anonymous.
Tips 9: Make Security Signs
Each of us must understand that the internet is never safe from the threat of cybercrime, so we need to minimize the risk of what might happen. For example, for shopping activities online or e-banking, do it with a personal computer, never through the cafe and also on the autocomplete does not store passwords or leaving any other trace. For a discussion activity on the forum or mailing list, use e-mail that does not save important messages, so even if someone manages to hijack the email, no personal things that he found nothing.
Tips 10: Install Plug-ins / Add On for browsing more secure
Some browsers come with plugins for security such as to prevent popup ads popping up we can install the add blocker on Firefox, or to determine the level of trust towards a website that we will go WOT we can install a plugin on Firefox.
Ok, Happy surfing in cyberspace.


succes for you...!

Previous
Next Post »

3 comments

JR delete 1 Juli 2011 15.48

Thank you so much for this post. It is really quite frustrating sometimes on how to manage and how to delete file

Rofiek delete 1 Juli 2011 15.52

okey...succes for you..!

James Maxwell delete 6 Agustus 2012 19.13

These are very good tips. Thanks for the post ans i have gone through so many blogs and websites. I have found some of the best. Safe web browsing.

Posting Komentar

Silahkan memberikan Komentar untuk kritik dan saran pada kolom dibawah ini