Client-Side Vulnerabilities Extra Protection

Today using online resources with a vulnerable system can make you exposed for new malwares and attacks, windows or any other operating system provides the daily automatic update for the OS component but not to all browser plugins and programs.

Your browser may be insecure for multiple reasons. It may contain a software issue that makes it vulnerable to malicious activity. You could also be running an outdated version of the browser or its plugins. So here you can find a list of tools for checking all plugins and software versions installed and if there is an update required:

1- Secunia Online Software Inspector (OSI) Secunia program will detects insecure versions of common/popular programs installed on your PC, Verifies that all Microsoft patches are applied, Assists you in updating, patching, and protecting your PC, Activates additional security features in Sun Java.

2- Qualys BrowserCheck is a tool that scans your navigator looking for potential vulnerabilities and security holes in your browser and its plugins. This tool will also help you fix the security issues discovered by the scan. So you run first scan and after performing the update you check one more time. Secunia is better as it runs over the full system but Qualys just check your browser.

3- Plugin Check for Mozilla will scan for your plugins version and inform you if there is a plugin outdated this will improve your navigation security for a safer navigation but of course Secunia better as it looks at the whole system and you can use it with any browser.

4- Panda ActiveScan 2.0 will check that your antivirus is offering the required protection and find hidden threats on your PC, such as rootkits, banker Trojans and malware designed to steal your identity it is simple, online disinfection of all malware detected on your PC.

These services are provided online freely that you can use from time to time beside the standard security kit you have on your system to be sure that your computer is secured and protected.

make sure you subscribe to my RSS feed!

Share
You can leave a response, or trackback from your own site.
  • Pingback: Mourad ben lakhoua

  • Pingback: 倒入卡米爾

  • Pingback: Mourad Ben Lakhoua

  • Pingback: Seeb

  • Pingback: SecureArabia

  • Pingback: SecureTechnology

  • Pingback: alex knorr

  • Pingback: Tweets that mention Client-Side Vulnerabilities Extra Protection | SecTechno -- Topsy.com

  • Pingback: Satyam Pujari

  • Pingback: CERT-XMCO

  • Pingback: Mourad Ben Lakhoua