Developed by Hacktivismo, which "\ under the aegis of the \ Cult of the Dead Cow (cDc)," Torpark is relatively new and based on the Firefox Portable code. The second tool I found is Torpark (at the URL below). Note that Firefox Portable won't run if another instance of Firefox is already running. The self-extracting executable dumps all the required files into one directory tree that you select. I tested Firefox Portable, and it works just fine. However, you can configure Firefox Portable to write such data to the portable media (if the media is writeable) and use cache if you like. Your download history is deleted when you shut the browser down cleanly (but not, for example, when you terminate the FirefoxPortable.exe process manually), URL history and form data storage are disabled by default, and no disk cache is used by default. Like regular Firefox, the portable version lets you install extensions and themes, but unlike Firefox, Firefox Portable helps prevent storage of usage information. You can install it on a small USB flash drive (or CD-ROM) and use it on nearly any PC that doesn't have its USB ports or CD-ROM drive locked down. First released in June 2004, Firefox Portable seems to be kept up to date, including the addition of any necessary security fixes soon after vulnerabilities are found.įirefox Portable is designed specifically to be copied onto portable media. The first tool, 's Mozilla Firefox - Portable Edition (at the URL below) is based on Mozilla Foundation's Firefox code but was independently developed by John T. So far I've found two tools that fit the bill. Since then, I've been looking around for other browsers that can help protect privacy above and beyond the typical browser features of being able to manually clear history and cache data. That's to be expected, and I do respect their opinions even though they differ from mine. = IN FOCUS: Two More Portable Anonymous Web Browsersīy Mark Joseph Edwards, News Editor, mark at ntsecurity / netĪ few weeks ago after I wrote about Browzar (see the article at the URL below), a few people wrote to criticize the tool. Manage threats and vulnerabilities from adware and spyware in one console as a comprehensive approach to maximizing network security. Microsoft Learning Paths for Security: Identity and Access Management Security Matters Blog: New Tool: WindowsZones Two IE Vulnerabilities Allow Unwanted Code Execution IN FOCUS: Two More Portable Anonymous Web Browsers Reducing the Cost of IT Compliance: Streamlining the IT Compliance Life CycleĬONTENTS = Patch and Spyware Management: An Integrated Approach to Network Security PLEASE VISIT OUR SPONSORS, WHO BRING YOU SECURITY UPDATE FOR FREE:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |