logo
Home Why How Feature Help  

 
How

The Fact

An inconvenient truth is: web is not secure for millions of people who browse it at public hotspot or internet cafe. Users are exposed to data hackers or identity theft, or worse. It takes a lot of technical hassles, often beyond the capacity of regular internet users, to secure their data exchange. Whether to use a proxy server, or to set up a VPN channel, not only people need specific technical knowledge, but also they need the server resource that is unavailable for most internet users.

The Solution

Web Freer web browser. By simply downloading Web Freer and and switching it as your default browser, you are free to go to any website without the need for worrying about any exposure to internet hacking or identity theft. It is a browser that employes the most secured 256-bits encryption, and it is a super fast, reliable browser. Web Freer is based on Chromium project, a wonderful, open web browser project.

There are many regular web browsers out there, however, for many internet users, they require more than a browser that is fast and more stable, they require a web browser that can overcome the security compromise, they require a web browser that can help them access information, knowledge, media securely. Web Freer is the unique browser that serves the course of securing the web users.

Help us improve, report a problem

The browser can't access certain websites

Tell us the site you can't access :

The browser always crashes on me.

The browser is too slow

Other problems



Tell us how to contact you for bug fix and product updates:

Email:



Contact us to describe the problem in more details.

Where the Risks Come From

Your regular browsers do have security features you may configure to make your browsing secure, the only problem is: it is pretty complex and often beyond the understanding of a non-techie. Also, if you tighten your security settings too much, you may be compromised to enjoy some nice features of the internet, although these features can ultimately compromise your security leve.

Attackers typically take control your computer through various security leaks. They use these leaks to manipulate your computer, steal your information, infect your files, and use your computer to attack other computers. An attacker can create a malicious web page that will install Trojan software or spyware that will steal your information and spread more malware. Rather than actively targeting and attacking vulnerable systems, a malicious web site can passively compromise systems as the site is visited. A malicious web page can be spread by emails, instant messages, blogs, social networks. In these cases, the act of clicking and opening the web page or attachment can harm your system.

Web browsers typcially have the following features that make them easy to expose to online risks.

Cookies are files placed on your system to store data for specific web sites. A cookie can contain any information that a web site is designed to place in it. Cookies may contain information about the sites you visited, or may even contain credentials for accessing the site. Cookies are designed to be readable only by the web site that created the cookie. Session cookies are cleared when the browser is closed, and persistent cookies will remain on the computer until the specified expiration date is reached.

Cookies can be used to uniquely identify visitors of a web site, which some people consider a violation of privacy. If a web site uses cookies for authentication, then an attacker may be able to acquire unauthorized access to that site by obtaining the cookie. Persistent cookies pose a higher risk than session cookies because they remain on the computer longer.

JavaScript is a scripting language that is used to make web sites more interactive. There are specifications in the JavaScript standard that restrict certain features such as accessing local files.

ActiveX is a technology used by Microsoft Internet Explorer on Microsoft Windows systems. ActiveX allows applications to be utilized by the web browser. A web site may provide the component as a downloadable object. This provides extra functionality to regular web browsing, but may also introduce severe vulnerabilities if implemented by malicious websites.

ActiveX is reported to have many vulnerabilities issues. One issue with using ActiveX in a web browser is that it greatly increases the attack attackability of a computer. Many vulnerabilities with respect to ActiveX controls lead to severe impacts. Often an attacker can take control of the computer.

Java is an object-oriented programming language that can be used to develop active content for web sites. A Java Virtual Machine, or JVM, is used to execute the Java code, or applet, provided by the web site. Some operating systems come with a JVM, while others require a JVM to be installed or updated before Java can be used. Java applets are OS independent.

Java applets usually execute within a sandbox where the interaction with the rest of the system is limited. However, various implementations of the JVM contain vulnerabilities that allow an applet to bypass these restrictions. Signed Java applets can also bypass sandbox restrictions, but they generally prompt the user before they can execute.

Plug-ins are applications intended for use in the web browser. Plug-ins are similar to ActiveX controls but cannot be executed outside of a web browser. Adobe Flash is an example of an application that is available as a plug-in.

Plug-ins can contain programming flaws such as buffer overflows, or they may contain design flaws such as cross-domain violations, which arises when the same origin policy is not followed.

Running a scripting language such as JavaScript allows web page authors to add a significant amount of features and interactivity to a web page. However, this same capability can be abused by attackers. The default configuration for most web browsers enables scripting support, which can introduce multiple vulnerabilities, such as:

Cross-Site Scripting

Cross-Site Scripting is a vulnerability in a web site that permits an attacker to leverage the trust relationship that you have with that site.

Cross-Domain Vulnerabilities

Most web browsers employ security models to prevent script in a web site from accessing data in a different domain.

Vulnerabilities that violate these security models can be used to perform actions that a site could not normally perform. The impact can be similar to a cross-site scripting vulnerability. However, if a vulnerability allows for an attacker to cross into the local machine zone or other protected areas, the attacker may be able to execute arbitrary commands on the vulnerable system.

Detection evasion

Anti-virus, Intrusion Detection Systems, and Intrusion Prevention Systems generally work by looking for specific patterns in content. If a known bad pattern is detected, then the appropriate actions can take place to protect the user. But because of the dynamic nature of programming languages, scripting in web pages can be used to evade such protective systems.

How to Make a More Secure Browser

A browser can be made more secure to prevent it from malicious attackers and security compromise on the open internet:

HTTPS connection: by making HTTPS a default connection, many attacks will not retrieve the explicit data exchange between a client computer and a website server, this thawtes a large amount of stealing efforts of the internet.

No-Plugins: a web browser can load as little plug-ins as possible to avoid security compromises.

Prevent cross-site scripting: a browser can be designed to block sites to access and retrieve information of other sites.

No-ActiveX: ActiveX is widely used by experienced hackers to take control of user's computer, by disabling ActiveX and use alternative mechanism, a web browser can inherently prevent its users from malicious attack and bad websites.

Higher security by default: by setting the browser security level higher by default, users will have the opportunity to be prompted when a security compromise is in concern, it will be presented with the possible danger before manually select to risk the computer or stay protected by the browser's default setting.

Higher privacy by default: by setting the browser security level higher by default, users will have the opportunity to be prompted when a privacy compromise is in conern, it will be presented with the possible privacy breach before manually select to risk the computer or stay protected by the browser's default setting.

Clear private data more often, this includes clearing the cookies, session cookies of all other websites visited.

Clear browsing history more often

How to Keep Computer Safe

Enable automatic software updates

Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information.

Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered, you may need to check the vendor's web site periodically for updates.

Run Security Software

You should equip your computer with the most effective security software and run it on daily basis.

Do Not Open Attachment in Your Inbox

Unless you are sure you know the sender and the file attached is reasonable safe. Many spyware and malware are spreading by emails, you will find yourself pretty well protected if you don't open any email attachment from the senders you don't know.

© 2017, webfreer.com Contact | Privacy | Terms