IT Security & Network Security News & Reviews: eWEEK Labs How-To: Using the NoScript Extension for Firefox to Protect Against Web-Based Malware

 
 
By Jim Rapoza  |  Posted 2009-03-04 Print this article Print
 
 
 
 
 
 
 
 
 
Previous
eWEEK Labs How-To: Using the NoScript Extension for Firefox to Protect Against Web-Based Malware
Next

eWEEK Labs How-To: Using the NoScript Extension for Firefox to Protect Against Web-Based Malware

with Jim RapozaThis slideshow features audio. Please adjust volume accordingly.
 
Listen as eWEEK Chief Technology Analyst Jim Rapoza walks you through installation of the NoScript Firefox extension. NoScript uses whitelist-based, pre-emptive script blocking to prevent exploitation of security vulnerabilities. The extension works with Firefox, Flock, Seamonkey and other Mozilla-based browsers, and allows JavaScript, Java, Flash and other plug-ins to be executed only by trusted Web sites.
 
 
 
 
 
Jim Rapoza, Chief Technology Analyst, eWEEK.For nearly fifteen years, Jim Rapoza has evaluated products and technologies in almost every technology category for eWEEK. Mr Rapoza's current technology focus is on all categories of emerging information technology though he continues to focus on core technology areas that include: content management systems, portal applications, Web publishing tools and security. Mr. Rapoza has coordinated several evaluations at enterprise organizations, including USA Today and The Prudential, to measure the capability of products and services under real-world conditions and against real-world criteria. Jim Rapoza's award-winning weekly column, Tech Directions, delves into all areas of technologies and the challenges of managing and deploying technology today.
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel