ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Technology»
  • Internet & the Web»
  • Viruses, Spyware & Internet Security

How You Can Browse Safe And Stay Secure Online

Updated on September 26, 2014


: You turn on your computer start menu to start Windows. Welcome. Have you any security software installed on your computer or desktop? Did you turn on your antivirus? Did you turn on any security tool to protect your computer and its system? Before proceeding on this discourse, I would like us to attempt a practical lesson. Let’s turn on security software or an antivirus to scan our computer. I had Microsoft’s malicious malware removal tool installed on my PC. Now I click it to scan my system for less than thirty minutes. This short scan is follow later with another short scan with Windows Defender Offline. A full scan follows with the same WDO while my PC is online. Whatever security tool you have on your PC you can apply it. Most of the time we go online without remembering to turn on an antivirus gear. We thought all is safe online. Little wonder did we realize that we are on a course that is mingled with good and bad. Let’s begin our talk. Happy and safe browsing!

Malware Can Spread Through The Internet

An Internet Facility
An Internet Facility | Source

Sub-standard Malicious Software

: Is your computer being infiltrated? Be aware that some antivirus software vendors have substandard or dubious software that enabled virus, spyware and malware to infiltrate your computer. A little while ago, I received a mail in my Gmail. It was located in the spam folder. The message was very short and clear to the point. The sum of $500 daily commission has been computed and to be paid to me. I do not know the purpose of this affiliate Payment. All that I have to do is to submit my PayPal ID, and I can be paid the commission. A password was given to login with a link.

What is more worrisome and suspicious is that the content even begs me to hurry up and move it to my Gmail inbox. But I did not compile. Would you do it in your right mind?

Rating For Panda Free Antivirus

4 stars for Panda Free Antivirus

Panda Free Antivirus Review

Initially free cloud antivirus and now Panda free antivirus, receive editors rating of 5 x. This antivirus software not long ago dislodged the well reputed and princely Bitdefeder from its number one supremacy as a virus removal tool in an independent AV competition. That this is so means it has acquired innovations that other antivirus gears may lack. In fact, its maker has affirmed that its intuitive intelligence is without parallel in the antivirus technology.

Panda free antivirus is now much lighter, very fast and user friendly. Being the first cloud-based antivirus ever, other antivirus software vendors will have a hard time to beat it on cloud technology feat. Panda is being constantly innovating in research.

This antivirus software works best when you connect your computer to the internet for a scan session. Download is fast and easy and takes just six minutes of your time. The installation will take up to two hours depending on how fast your internet connection is and with some annoyance, if they is flanky internet connectivity. You can download the gadget here. Download it at this site


This software comes with its security toolbar. Enable it when you are prompt. But ensure you use your discretion in retaining or deselecting the Yahoo! and Mystart default as homepage and search providers respectively or you will find “it annoying.” If you had Panda cloud antivirus already on your computer, you must uninstall the old version 3 first before installing the new Panda Free Antivirus 15.

What is more, when you download and install it, it checked your computer status for compatibility with other software already installed on your system. For example, I want to test how far this software is compatible with Windows Defender Offline WDO. So, I just go and download it without uninstalling WDO. My computer a Windows 7 still works fine.

The short scan, now critical scan, is highly recommended before the custom or long scan. It offers real time protection. Its ads only serve to encourage you to upgrade to pro. and no more.

This new version of Panda free antivirus 15 includes innovative in “USB drive vaccine and the anti-exploit technology” that is a cutting-edge in online security solution. Recall that Zero-Day is a relatively new malware technology which is giving many security outfits some worry.

Panda Free Antivirus 15 Promotion

New Panda Free Antivirus
New Panda Free Antivirus

Comparison Of Antivirus Software Products: Feature Price Vendors

Windows Defender Offline (WDO)
works online and especially offline, weekly updates, removes malware,spyware and virus; includes short, full and custom scan.
free ware
windows microsoft
avira free antivirus
slow, good and can be annoying depending on the type of computer/tablet use
free ware
Panda free antivirus
First free "cloud-based" antivirus; pro version s paid. works specially online; removes all malware and spyware
pro $39.99
panda security
scan and removes all sorts of malware.;flash scan only in paid version
paid edition $24.95
malwarebytes organization
traditional scan, update mirrow, works both online and offline
free ware
microsoft security essential
like WDO works both online/offline, removes all virus and malware, first traditional free antivirus from Windows
free ware
windows microsoft
Some computer Antivirus Software

My Computer Is A Microsoft Windows

When you bought a new personal computer or a desktop, what internet browser is identify with it? My computer is a Microsoft Windows 7. And as such, Microsoft’s Internet Explorer (I E) is discovered with it. Almost all my friends, acquitance, relatives and business associates have a windows computer. Microsoft windows computers and desktops seem to be most popular and prefer always by more than half of all computer users.

Okay, let’s get down to the question of the browser. As noted, the browser that comes with Windows machines is I E. Various updates from version 7-11 has been release. Version 11 is the latest. This edition of I E 11 at present is enhanced by Bing. Whatever variation your browser is, you have the opinion or prompting to upgrade it to the current update. This is one sure and safe step to stay secure one line.

Having said this, it is to be realized that other variations of the web browsers are not very popular. Google chrome, Microsoft’s Internet Explorer and Mozilla Firefox are the most used web browsers. Apple’s Safari seems to take a fourth place followed by Opera, in the fifth place.

A Microsoft Windows Computer

A Cumputer
A Cumputer | Source

Speak Your Mind

The world's first web browser is likely

See results

What A Web Browser Is

Let’s take a look at few or some of the web browser in operation. Before this, it is even more useful to look at the development of the browser and what is trending high at the moment. Your approach or input to this particular technology is worthwhile.

A browser or web browser is an electronic software application that you can used to source, receive and retrieve information online. You can even use it to receive mails, files, videos, photos and images, electronic devices in the form of downloadable for example, e-books and software. Additionally, all these items can be up load by the same browser. A browser can be easily view as an electronic tool to receive and send out information, data, mails, images, e-books, etc on the internet. All these are done from one’s personal computer. The beauty of this is that you can use a friend’s or relation, or an office computer for doing all this. For example, you can solicit a friend to use his/her computer to check your mail box and answer a mail in your inbox. When you are done, just sign out, and your mail remained safe and secure. Again, that you can use any computer to respond and sent a mail from your inbox other than your personal computer is one of the most beautiful things the computer can do via, the browser. You can do all this anywhere from the world. A web-browser has no edge or limit to communicate. It is without border. What is your opinion of this service? How do you think this product can be more useful in another way? If you like technology, than you have a positive answer to this issue. Almost every person got carried away by the latest technologies.

All these are easy matters provide you have internet connection from your internet service providers.

History: With the development of the internet, the web-browser comes into prominence. The first web browser in the world is the worldwideweb (no spacing), and shorten www as we all know it. The www was later developed and release as a mosaic or model for all future browsers. And so, the mosaic became the only frame work or practically, the good example on which all and subsequent web browsers were innovated. Thus, “the world’s first popular web browser was born.”

Browser War: Nescape Navigator or Nescape Communicator results first from the mosaic. It soon became very popular and was even regard as the world’s most popular web browser, like its parent mosaic.

Then enter Internet Explorer (I E). The browser war or market competition between browsers has begun. Internet Explorer which was also mould after the mosaic was soon to overtake the Navigator! Much later, Opera had to join the competitive war but failed woefully! It made a market share of at least1% in use, an insignificant figure compare to Navigator 90% and I E 95% respectively.

The war had to take on a wider dimension with the realization of Mozilla Firefox. Others foremost in the races are Apple, Safari and Chrome.

The entry of chrome into the race in September 2008 is commendable. Having overtaken I E and all the other browsers combined, it reach a market high by April 2014.

Chrome by Google is the most popular and the most used web browser in the world, helping at most 1.1 billion people to surf safe online. Popular, not because it is the best, but because many prefer for its security and safety features that is still being brought up to date. But which is the best web browser? Internet Explorer or Mozilla Firefox? How do you get your answer? Is there some peculiar features that render your choice the best?

Presently, Microsoft’s I E has the highest market share of all web browsers, and followed by chrome, Firefox, Safari and Opera One other relatively new web browser is Maxthon International Asia. New in the sense that it used a technique called cloud-based technology. It is the foremost in using cloud technology in browser at present; and set the pace for all other "cloud-based" browsers.

I E and Google seems very much alike. But Google has a question with search engine tool bar.

The World First Web Browser

Nescape Navigator
Nescape Navigator

The Five Most Used Web Browsers

Web Browsers
Web Browsers

The Trade Mark Interface Of Google The World's Most PopularWeb Browser

Google Chrome
Google Chrome

Web Browsers Are Downloable On Mobile Phones

Mobile Phones
Mobile Phones | Source

Another High Power Internet Facility That Can Be Infected With Malware

An Internet Facility
An Internet Facility | Source

Browser Safety

It has been said the internet or online world is a very dangerous place. Same reasoning holds true for the offline world likewise. There is this guy who goes online to surface the web. He was a Firefox fan. He installed the Avira browser safety adds-on on his machine, but when he attempted to download a program, he will be directed to Avira web site; while others who use chrome will receive warning before landing on such sites. Does this mean the Firefox browser is unsafe? The answer is no. I have experience the same issue with Ask Tool Bar. While downloading Firefox on my machine from Mozilla, the ask tool bar was enable. I try to visit my affiliate site, but it sent me to upgrade its tool bar on ask internet site. I uninstalled it from my computer. All this shows that many legitimate web sites on the internet at times are compromised. In such case, even the best and most reliable browser could not be of much help. So you should not add any extension or adds-on on your computer without a better understanding of what the software do on the internet.

Google chrome, I E and Mozilla Firefox are safe browsers for example. But you can render them useless by adding unreliable tool bars, extensions, etc on them.

Unsafe sites Online: How many websites do you think is out there on the internet? 300,000? 500,000? 100,000,000? Apart from this, what about the many blogs both corporate and private? There are billions of websites on the internet. That is the truth. All these sites although real and lawful are compromised daily. This is also a truth to be aware of. By virtue of some of these sites being via media, they become unsafe. They can be like to the man in the middle attack.. Visiting these unsafe sites online also means compromising your machine to malware and phishing issues. These threaten your privacy and security. These sites on which you are directed will install malware. on your computer and at the same time will also trick you into sharing “your user name and password or sharing other private information”

Understanding Malware Sites

A malware is any software application trying to download and take control over your computer. But what is a malware site? I had a hard time trying to imagine this or get a clear meaning of this in a dictionary or online. Mal- means bad and site is a location or address. So, a malware site online could mean a bad location address or URL on the internet that tricks you to land on a phishing (false) web site instead of the guinea web site you are trying to visited or which you are a regular visitor. For example, you want to visit Microsoft Download Center, but it took you to another counterfeit center with a Microsoft Logo. What do those sites aimed for? They seek private information on billion dollar corporations and individuals. Another is identity theft and attacking of computers and cyberspace. “If your site has been infected”, inferring that these malware sites not only gathered private information, but also compromised your blog or web site personal and corporate as a malware entity, “it is generally because some vulnerability has allowed a hacker to take control over your site” Google opine .

Surprisedly, these malware were at the same time installed and run automatically. Once, your computer, browser, site or blog has been fully compromised with malicious contents, they are as good as “one potential vector of malicious content” or “malware infection vectors.” You can take care of all these by installing good antivirus software from trusted vendors. Download and scan your computer with this Microsoft free software-Microsoft malicious software removal tool first than download and installed Microsoft Security Essential on your computer if you have none at

thereafter, run automatic update always. In other words, update these security patch and antivirus always whenever a new update is made available. Some online shopping websites for example, EBay has they own antivirus patches. These can be trusted if you do shopping with them or you are one of their marketing affiliates. EBay maintains Trusteer Rapport the antivirus software for its website. It usual protected the website you visit, but you should not compromise your password with it.

Malware Can Include Man In The Middle Attack

Man In The Middle
Man In The Middle

Interface Of Panda Free Antivirus Scan

A Scan About To Begin
A Scan About To Begin

Panda Free Anti Virus Scanning A Computer

A Computer Scan
A Computer Scan

Software System And Vulneabilities

A vulnerability in computing is any defect, flaw, weakness, etc in software or hardware systems that leave the security of the system organizational, corporate or personal open for detection and attack by a third party. The attack is an exploit in part or the whole system when compromise, a denial of service results. Your machine meanwhile becomes under the control of another power which you do not intend and want.

The flaw or defect arise mostly in the architecture of the software. Your machine is as good as the makers made it to be. It is not 100% perfect. It comes into the market in very good condition, but misuse by you or a third party can open a hole in it for an attacker to work exploit.

Browser Vulneability The issue of vulnerability is very important here. Your browser whether you use Chrome, I E, Firefox or your favorite has one or two weakness in it. These defect are not realized when it was released into the market. It was a tested and retested because anything can happen when you go online with the software. Let’s take chrome as an example. It is an open source browser in that it is still subjected to development. It is expected that user experience with the software can help bring in more issues and hence, a better way to make it better. Have you wonder why Windows 8 has evolved from Windows8.1 to Windows RT 8.1 in a relatively short time? The users experience is still subjecting the machine to changes.

How many of us are aware that Google do subject its chrome browser to trusted software vendors that will detect any vulnerability in the software and get paid for it? Within twelve hours or so of the detection, Google will update chrome to a more secure level than ever. We, the users of chrome are required to submit any issues we found while using the software. I had uninstalled my chrome browser at most two times within three years. Each time, I was asked why I uninstalled it. My feedback like yours if any help Google to make all its products secured Your browser whether Chrome, I E, Firefox, etc is a vulnerable software. Google has released a newer version of chrome. The latest update now is 37.02062.15 m. To get it,

  • Open your chrome browser.
  • Go to the chrome wrench located at the extreme right end of the search box and click on it.
  • In the small new window that opens, scroll down to “About Google Chrome.”
  • Click on this bar.

Your chrome browser will automatically be updated within a few minutes, provide you have internet connection. You should regularly visit this on your computer to ensure you are up to date with the latest device released.

Again, say you use either I E or Mozilla Firefox, you can still update these browsers likewise. For I E,

  • Launch I E.
  • Click the tool icon to the extreme right of the browser
  • Click “About I E.”
  • Mark (v ) in the small square box. Any new update will be installed automatically for the I E 11 which is the current update.

If you use versions 7, 8 other than 11, better update your I E Browser for safe browsing online.

For Firefox,

  • Launch Firefox.
  • Move your cursor to the extreme left of the browser and click on Firefox.
  • A new window appears.
  • Move cursor down to “help.”
  • Move cursor down to “About Firefox” and click.

The system will automatically search for updates and update your browser.

Alternately, if you made chrome your default browser in Firefox,

  • Launch Firefox.
  • Click the chrome wrench on the extreme right and a small new window appears.
  • Scroll cursor down to the (?) icon and click to open help menu.
  • Another small new window appears.
  • Click on “About Firefox” in this new window.

Again, the system will automatically search for updates. This is the beauty and simplicity of it.

Coupled with vulnerability is browser exploit. If you experienced signs like change in homepage, search page, any changes in your favorites and your settings of internet opinion, etc there is no question that your browser has been compromised.

Prevention: Check your fire wall setting.

  1. Install or turn on firewall setting.
  • Click the start menu or button on your computer.
  • Type firewall.
  • In the new window, click “Windows Firewall”.
  • Click “Turn Windows Fire Wall On”.
  • Close window.

Tip: Do not uninstall Windows fire wall in preference to another superior or stronger fire-wall settings. These may contain malware codes. Whatever firewall setting your PC comes with retained it.

  1. Update your browser and software regularly. Much has been said about this above.
  2. Do not open e-mails and attachment from an unexpected source. I narrate much earlier in this discourse about an e-mail sent to my Gmail inbox. Good reasoning should have said it should not land in my mail box due to the fact that my default browser chrome could have prevented it. But this is not the case. The system identified it as spam. I had to confirmed it so and delete it. Had I moved it to my inbox as instructed, my browser, computer system could be adversely affected with malware, adware, spyware, etc This identification is good medicine for my browser and computer system and to the credit of chrome. An email land in your inbox said you win a lottery. Did you actually enter for it? Deleted it. This is the best thing you can do about all such nonsense.
  3. Do not make download from an unexpected and untrusted source. For example, I always made download of my browsers from the download center of Microsoft, Google, Firefox, Internet Explorer and any trusted vendors. Making the download is one thing and installing it is another. When the user account control (UAC) wizard prompt you “Do you want the following program to make changes to this computer” the UAC will identify the source for you. It is either from the “Unknown Publisher” on the internet or from your trusted vendor. When from the unknown publisher uninstall the download period. If you proceed on your system will be compromised will malware.

With this, you can know your browser is not infected and you can browse safely online. There was this relative “Zero Day” vulnerability that attacked I E browsers discovered by Microsoft. Microsoft Security said it is a “limited targeted attacks” on I E 7-11. The attack will direct you to visit a malicious website. So be on sharp alert throughout. “This would typically occur” said Microsoft “by an attacker convincing someone to click on a link in an email or instant message.”

Microsoft give notice that you update your systems as instruct above. You can get additional help at please book mark this page in your browser.

Here you get help from Microsoft to:

  • Protect all your/ its products you use.
  • Install the latest security updates.
  • Fix safety scanner; and
  • “Explore Microsoft Support system.”

HTTPS Everywhere: is more secure than

Secure HTTP
Secure HTTP

http/www. will sooner give way to https/www. in search engines

Unsecure HTTP
Unsecure HTTP

Password And Protection

A third party if not trusted, can gain access to your computer without your leave if your computer is not protect by a strong password. You can create strong password and secure them for your computer, mail box, online banking accounts and much more.

A strong password depends on the combination of the different characters and symbols used on your computer keyboard, and the length of the characters. A minimum of eight to thirteen characters is considered medium. Fourteen to nineteen is strong and best. To create a strong password, do these things.

  • Choice four letters from the upper case alphabets A to Z.
  • Choice four letters from the lower case alphabet a to z.
  • Choice four characters from the Arabic numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.
  • Choice four special characters from any of # ^ $ % ( _ * + : < ? > ! / { [ : ] } etc but do not use the @ sign.

If we choice two characters each from the four categories, password will be either weak or medium in strength, and this is easy to break by hackers and spammers.

An access to a single computer by an attacker any where can gave xyz to the attacker to access the data base of an online corporate giant.

Passwords are created by easy to remember sentences, etc. and by substituting some of the words, with letters and so on. For example,” my exam will start on 9 September, 2014.” will become MXwso9th9;t019. I test this on a password checker at (note: click on this link that will take you to a new window; in the new window, click Password Checker.Using Strong Passwords/Microsoft Security) and it is strong. Create your password and check its strength before going further. A strong password even depends on how long it take an attacker to crack it. Will it take minutes, hours, days, a week or a month or years? This is so vital. Test your password strength here

Consideration In Creating A Password.

A password should be very strong. Medium to weak password are very easy to quest and break by an hacker.

  1. Do not use common words like Tom, Vespa, Money, God, Monkey, etc.
  2. Do not use computer keyboard characters "1234 or qwerty,"
  3. Change your password often every week but not every day.
  4. Use different password for all your different accounts or emails. Your facebook password should be different from your yahoo, Gmail, hotmail account etc. If you use “Dido” for all of these and when dido is cracked by an attacker, you are as good as zero.

Top Facts Summarized

1. Install any of the paid or free edition of antivirus on your computer.

2. Turn this on before you browse.

3. Additionally, installed a professional or free antivirus/malware removal tool on your PC from trusted vendors.

4. Whatever browser your computer comes with retain it. But feel free to download or make another your default homepage/search provider.

5. A web browser is a electronic software application you use to receive, retrieve and source for information online. You can use it to send and respond to all your mails.

6. The first web browser is the model for all the present day browsers, the moisac being the first popular web browser. Nescate, IE, Firefox are other browsers. Google has superceded all in popularity.

7. Update your browsers weekly as new updates are release by your trusted vendors.

8. Use strong password for your computer and each mail box ID.

9. Do not allow your computer to be used by an untrusted person.

10. Panda free antivirus is the best "cloud-based" malware removal tool in the market.

To your online safety!

Copy right Miebakagh57 (Miebakagh Fiberesima)


    0 of 8192 characters used
    Post Comment

    No comments yet.