With the Firefox browser in China, more and more popularity, Firefox security settings become effective the first use Firefox browser, preventive measures, then this would introduce a Firefox browser security settings article Tips for users browsing in peace Time to do something against.
Firefox security settings 1. Modify useragent
FF in input about: config, add general.useragent.override
Set GoogleBot 1.2 (http://www.google.com/bot.html)
You can also set the other.
Set to googlebot to visit some sites restricted, such as yahoo, wiki, gmail. With a firefox plug-ins to switch the useragent can
Firefox security settings 2. Install the security plug-ins
Installation noscirpt and firekeeper
Set in NOSCIRPT which prohibit JAVA / ADOBE FLASH / SILVERLIGHT / Other plug-ins / IFRAME. Anyway, as long as the prohibition of all checked.
Select Trusted sites is still on the application of these restrictions.
These settings will not affect the
Firefox security settings 3. Install TOR and TORBuTTON
Some do not trust the site visit with the TOR. But do not come into the email with what tor. Fbi and Heavenly have set a lot of sniffable exit node.
Firefox security settings 4. Cancel a file association
wma / avi / swf these default to automatically open / play. This is very dangerous, while others can be judged by the operating system versions of these objects, while if the Storm video, windows media player, then overflow will affect the ff.
In the file type to all file types which the action is set to save to your local disk. If you want to see the flash, on whether flash.
Firefox security settings 5. Anti-XSS / CRSF
There noscirpt and firekeeper, and had anti-cross-site these should be done well. But just in case, have to set the look.
The removal of privacy when out FIREFOX hook on my data.
This time out of what firefox cookie will be cleared. Someone made a url for your point about something, do not steal cookie or something.
Firefox security settings 6. Against the other and grasp 0DAY EXP
The above settings have been relatively safe. But not enough.
firekeeper can help.
The following is a rule firekeeper
alert (body_content: "anih | 24 00 00 00 |"; body_re: "/ ^ RIFF .* anihx24x00x00x00 .* anih (?! x24x00x00x00) / s"; msg: "possible MS ANI exploit"; reference: url, http: / / www.determina.com / security. research / vulnerabilities / ani-header.html;)
Similarly we can determine any jpg, gif which is not containing specific file header. This is not really to judge the picture.
However, if the picture really overflow, then header there is. It could have been prohibited, but this ban, meaning no browser.
So I was given some keywords firekeeper
Consecutive five of% u *% u *% u *
Consecutive 5 & #
This can not only prevent, luck might even catch what 0day.