|            | 
 | 
 | 
 Internet Browsers
	Internet BrowsersThis article says that IE 11 is faster on various tablets.
There is a Touch version of IE 11 for tablets.
Apple discontinued their Windows browser as of 6/14/2013. The last Windows version (5.1.7) is available from Cnet.com/Download.com here.
| 
 | 
 |       | 
| 
 | XHTML Beginning XLST 2.0: From Novice to Professional, by Jeni Tennison (Apress, 2005, ISBN 1590593243). Beginning XML with DOM and Ajax: From Novice to Professional, by Sas Jacobs (Apress, 2006, ISBN 1590596765). |       | 
| 
 | For $25/year, Proxify allows additional settings to hide your IP address so you can access websites from behind overly restrictive corporate firewalls. 
	
	 
	
	 
	
	 |       | 
| 
 |       | 
| 
 |  Download 
	Fred Langa's batch scripts to scrub your hard drive clean of junk files.  
	You can install this batch file in your Recycle Bin menu.  |       | 
| 
 | 
 SPACE bar to page down SPACE+Shift to page up  ALT+SPACE+C to Close, 
 ALT+SPACE+R to Restore, Instead of clicking on the Back and Forward buttons, you can give your mouse a rest and use Alt and the Right arrow key to move forward, and Alt and the Left arrow key to move back. |       | 
| 
 | 
|  Beware that malware offer programs to remove themselves, at a price. 
So they are practicing extortion! Again, don't buy any product advertized this way | 
 each have a different role
each have a different role
 Freeware CWShredder written by Merijn fixes damage by  
variants of the CoolWebSearch (CWS) hijacker.
	
	Freeware CWShredder written by Merijn fixes damage by  
variants of the CoolWebSearch (CWS) hijacker.
	
	 Shareware Spybot S&D (Search and Destroy) (SpybotSD.exe) 
	Notices changes to the Windows Registry with its own xSpybotSnD entry.
	I works alongside
	
	Shareware Spybot S&D (Search and Destroy) (SpybotSD.exe) 
	Notices changes to the Windows Registry with its own xSpybotSnD entry.
	I works alongside 
Freeware SpywareBlaster from Javacool Software doesn't scan but prevents the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted pests. Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox. Restrict the actions of potentially dangerous sites in Internet Explorer.
	 Freeware Ad-aware from Lavasoft in Germany removes Gator.
	
	Freeware Ad-aware from Lavasoft in Germany removes Gator.
	 Bazooka Adware and Spyware Scanner from Kephyr
	
	Bazooka Adware and Spyware Scanner from Kephyr
	 Shareware SpywareGuard (sgbhp.exe and sgmain.exe) catches spyware re it's executed.
	
	Shareware SpywareGuard (sgbhp.exe and sgmain.exe) catches spyware re it's executed.
	
	 Freeware Hijack This lists key areas of a computer's Startup list in the Windows Registry.
	
	Freeware Hijack This lists key areas of a computer's Startup list in the Windows Registry.
This identifies programs automatically invoked at start-up in Registry key 'HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run'
	 Cloudmark Anti-Fraud Toolbar browser plug-in (free beta version) 
	blocks sites and IP addresses on their  blacklist
	of known sources of malfeasance (spammers and those operating phising schemes)
	identified by the 1.3 million Cloudmark SafetyBar users who pay the $40 a year for MS Outlook.
	
	Cloudmark Anti-Fraud Toolbar browser plug-in (free beta version) 
	blocks sites and IP addresses on their  blacklist
	of known sources of malfeasance (spammers and those operating phising schemes)
	identified by the 1.3 million Cloudmark SafetyBar users who pay the $40 a year for MS Outlook.
	 Comodo's TrustToolbar relies on a  whitelist  of known trusted sites identified by 
	"the internet's only identity assurance infrastructure", 
	idauthority.com, which researches the companies behind sites.
	
	Comodo's TrustToolbar relies on a  whitelist  of known trusted sites identified by 
	"the internet's only identity assurance infrastructure", 
	idauthority.com, which researches the companies behind sites.
	Phishing.net's Clear Search Anti-Phishing.
 Beware of posers.  Memory Watcher, which claims to help you watch your memory,
actually installs the Peper Trojan.  Hidden in the middle of its disclosure:
Beware of posers.  Memory Watcher, which claims to help you watch your memory,
actually installs the Peper Trojan.  Hidden in the middle of its disclosure:
	
Among the commercial for-fee software:
 $39.95 Trojan Hunter from Mischel detects trojans which can't be seen in Task Manager because they 
	inject themselves inside valid processes.  Recommended by 
	Ian Richards' anti-trojan-software-reviews.com
	
	$39.95 Trojan Hunter from Mischel detects trojans which can't be seen in Task Manager because they 
	inject themselves inside valid processes.  Recommended by 
	Ian Richards' anti-trojan-software-reviews.com
	 None of these program could detect/clean the IE hijacker which directs all
	web pages to (spotresults.com, azjmp.com).  
	The pernicious pest reinstalls 
	DSO (Data Shared Objects) after Spybot attempts to delete it.
	This is because the pest exists in memory
	The 
	DSOStop2.exe fixes the registry keys for signed and unsigned ActiveX pests.
	None of these program could detect/clean the IE hijacker which directs all
	web pages to (spotresults.com, azjmp.com).  
	The pernicious pest reinstalls 
	DSO (Data Shared Objects) after Spybot attempts to delete it.
	This is because the pest exists in memory
	The 
	DSOStop2.exe fixes the registry keys for signed and unsigned ActiveX pests.
After boot up in Safe Mode to delete these hidden files:
	 The 
	uninstall for the peper trojan must be run while you're online.
	The 
	uninstall for the peper trojan must be run while you're online. 
Some viruses change their name. Search for file name *cpy.dll in Windows/System32. But this has to be done in Safe Mode with no Internet connection.
Other precautions:
	http://www.onlinepcfix.com/spyware/spyware.htm
	spyferret.com
	 $30/year SpySweeper.exe from Webroot Software which is promoteed by 
	this review, which leaves out Trojan Hunter.
	
	$30/year SpySweeper.exe from Webroot Software which is promoteed by 
	this review, which leaves out Trojan Hunter.
	 Pest Patrol is free to scan, pay $40 to activate removal functions.
	
	Pest Patrol is free to scan, pay $40 to activate removal functions.
	 Freeware Bazooka Adware and Spyware Scanner
	
	Freeware Bazooka Adware and Spyware Scanner
	
	 Spy Ware Info.com rs detailed advice.
	
	Spy Ware Info.com rs detailed advice.
	 Annoyances.org
	
	Annoyances.org 
	 Winsock2 LSP-Fix to select inetadpt.dll
	and move all instances of it to the Remove (RHS) side.
	This is a rogue Layered Service Providers (LSP) inserted into Window's TCP/IP handler 
	to intercept outbound data and divert it elsewhere.
	
	Winsock2 LSP-Fix to select inetadpt.dll
	and move all instances of it to the Remove (RHS) side.
	This is a rogue Layered Service Providers (LSP) inserted into Window's TCP/IP handler 
	to intercept outbound data and divert it elsewhere.
When I tried to open an Adobe Acrobat (.pdf) file, I got “Page blocked” instead. But instead of turning off the program entirely to get to a page it blocks (very dangerous), I figured out how to better control the program. I change Zone Alarm configuration temporarily.
In the Privacy tab, click Custom in the Mobile Code Control section. I uncheck “Block mime-type integrated objects”. This is because Adobe acrobat pdf files are a special mime-type.
 About spyware cookies that compromise confidentiality of information
	on your computer.  This opens you up to liability.
	About spyware cookies that compromise confidentiality of information
	on your computer.  This opens you up to liability.
	 Test pop-up ad blocking software
	
	Test pop-up ad blocking software
	 Block pop-up ads with 
	$29 Meaya.com, ShieldsUp, and others mentioned in 
	Webattack.com
	Block pop-up ads with 
	$29 Meaya.com, ShieldsUp, and others mentioned in 
	Webattack.com
Opt-out from 3rd-party tracking cookies at the source -- those providing online advertising technologies.
 
	 
	 
| 
 |       | 
 Mozilla Firefox Extensions
Mozilla Firefox ExtensionsFirefox 3 is worth the extra download/install effot becoming of its speed, and especially extensions:
	 Beware that extensions can cause other Javascript apps
	(especially Google Apps) to behave strangely.
	Beware that extensions can cause other Javascript apps
	(especially Google Apps) to behave strangely.
	 Download Firefox extensions, which have .xpi file extentions.
	Mozilla requires developer attention with each new major version.
	So extensions can die from developer neglect.
	Download Firefox extensions, which have .xpi file extentions.
	Mozilla requires developer attention with each new major version.
	So extensions can die from developer neglect.
If your extension becomes obsolte, version compatibility can be forced using "Nightly Tester Tools" FF-Addon or manaully this way:
 7zip.
7zip.
 Canvas Tag
Canvas TagThe <canvas< tag by HTML 5 will cause a major revolution in the web and in testing web applications. It replaces flash video plug-ins by enabling JavaScript to draw vector graphics.
See my notes on CSS
Related:
|   
 | Your first name: Your family name: Your location (city, country): Your Email address: | Top of Page   Thank you! | |||