top of page
  • Writer's pictureTharun kumar

Exp 4: Configuring Security for Web Browsers

Aim: To study and configure the security for web Browsers and to monitor how websites accesses the user’s browser contents.

Privacy Setting:

Upon adjusting Internet Explorer's privacy settings, we can see how the websites monitor your online activity. For example, you can decide which cookies are stored, choose how and when sites can use your location info, and block unwanted pop-ups.

1. Cookies:

Websites record information about you and your preferences in the form of tiny files called cookies on your computer. By allowing websites to remember your preferences or allowing you to avoid having to check in each time you visit a certain website, cookies can improve your browsing experience. However, some cookies may compromise your privacy by monitoring the websites you visit.

Delete and manage cookies

To delete cookies

1. Click the Tools button in Internet Explorer, then select Safety, then Delete Browsing History.

2. Check the box next to Cookies and website data, then click Delete.

Block or allow cookies

You can block cookies if you don't want websites to store them on your computer. However, doing so may cause some pages to appear incorrectly, or you may see a warning from a website informing you that cookies are required to view that site.

1. In Internet Explorer, go to the Tools menu, then Internet Options.

2. Go to the Privacy tab and select Advanced from the Settings menu to accept, block, or be prompted for first-party and third-party cookies.

2. Do Not Track

When Do Not Track is turned on, Internet Explorer will send a Do Not Track request to the sites you visit and to the third parties whose content is hosted on those sites to let the sites know that you would prefer not to be tracked.

Turn off Do Not Track

· Open Internet Explorer and select the Tools button

· Select Safety > Turn off Do Not Track requests.

Use Tracking Protection to help protect your privacy. Tracking Protection helps prevent your browsing info being sent to third-party content providers on sites you visit by blocking content from those providers.

3. In Private Browsing

Browsers store some info—like your search history—to help improve your experience on the web. When you use InPrivate Browsing, info like passwords, search history, and page history is deleted once you close the tab.

To open an InPrivate Browsing session, right–click the Internet Explorer icon on the taskbar, and select Start InPrivate Browsing.

To turn off add-ons in InPrivate Browsing sessions

1. Open the desktop, and then select the Internet Explorer icon on the taskbar.

2. Select the Tools button, and then select Internet options.

3. On the Privacy tab, select the Disable toolbars and extensions when InPrivate Browsing starts check box, and select OK.

4. Location

Location Services lets sites ask for your physical location to improve your experience. For example, a mapping site can request your physical location to center the map for you. Internet Explorer will let you know when a site wants to use your location. When this happens, select Allow once to let a site use your location just one time. If you want the site to use your location each time you visit, select Always allow

To turn off location sharing

If you don't want sites to ask for your physical location, you can turn off location sharing. Here's how:

1. Click the Internet Explorer icon on the taskbar to launch the browser.

2. Select Internet options from the Tools menu by clicking the Tools icon.

3. Select the Never allow websites to request your physical location check box under Location on the Privacy page. [Ref : 1]

5. Pop-up Blocker

Pop-up Blocker restricts or prevents pop-ups on websites you visit. You can customise the level of pop-up blocking, receive notifications when pop-ups are blocked, and establish a list of websites that you don't want to be banned. Internet Explorer's pop-up blocker settings are the only ones that apply.

To turn Pop-up Blocker on or off

1. Open Internet Explorer, select the Tools button, and then select Internet options.

2. On the Privacy tab, under Pop-up Blocker, select or clear the Turn on Pop-up Blocker check box, and then select OK. [Ref : 2,3]

Block all pop-ups

1. Launch Internet Explorer, then click the Tools button, then Internet Options.

2. Select Settings under Pop-up Blocker on the Privacy tab.

3. In the Pop-up Blocker settings dialogue box, select High: Block all pop-ups from the Blocking level drop-down menu (Ctrl + Alt to override).

4. Click OK after selecting Close.

Turn off notifications when pop-ups are blocked

· Open Internet Explorer, select the Tools button, and then select Internet options.

· On the Privacy tab, under Pop-up Blocker, select Settings.

· In the Pop-up Blocker settings dialog box, clear the Show Notification bar when a pop-up is blocked check box.

3. Select Close, and then select OK. [Ref : 4]

6. Tracking Protection:

Tracking Protection helps prevent information about your browsing from being sent to third-party content providers on sites you visit. Think of a Tracking Protection Lists as a “do not call” list. Internet Explorer blocks any third-party content from sites on the list, and limits the info that those third-party sites can collect about you.

REFERENCES

1. https://github.com/sharanyavenkat25/Cryptanalysis-TranspositionCiphers/blob/master/project.py Fetched: 2022-06-10T08:21:22.8600000

2. https://www.nyit.edu/files/its/SC_Peoplesoft_PopUpBlockerInstructions.pdf Fetched: 2022-06-10T08:21:31.6500000

3. http://www.seattle.gov/documents/Departments/FAS/PublicDisclosure/PRRC_troubleshooting. pdf Fetched: 2022-06-10T08:20:56.0630000

4. https://eweb4.ccf.org/onlinelearning/browserDetect/BrowserDirections.htm? txtBrowser=Chrome Fetched: 2022-06-10T08:20:55.7570000

5. URL: https://support.microsoft.com/en-us/windows/delete-and-manage-cookies-168dab11-0753- 043d-7c16-ede5947fc64d Fetched: 2021-05-07T10:49:08.8870000


Conclusion: Hence the security for web Browsers has been configured and the usage of cookies on websites is monitored successfully


Reference:

1. URL: https://support.microsoft.com/en-us/windows/delete-and-manage-cookies-168dab11-0753- 043d-7c16-ede5947fc64d Fetched: 2021-05-07T10:49:08.8870000

214 views0 comments

Recent Posts

See All

AI Enhanced Cyber Threats

Advanced machine learning algorithms, powered by artificial intelligence, significantly improve threat detection in cyber security. By analyzing extensive datasets in real-time, these algorithms excel

Comentarios


bottom of page