{"id":2380,"date":"2013-05-28T12:28:59","date_gmt":"2013-05-28T16:28:59","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=2380"},"modified":"2013-05-28T12:28:59","modified_gmt":"2013-05-28T16:28:59","slug":"five-steps-to-ultimate-firefox-security","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2013\/05\/28\/five-steps-to-ultimate-firefox-security\/","title":{"rendered":"Five steps to ultimate Firefox security"},"content":{"rendered":"<section class=\"page\">Over the years, many have touted Mozilla\u2019s Firefox as one of the most secure Web browsers. But as with other browsers, the security level offered depends on the settings. Some security features need to be manually enabled. Those turned on by default should still be double-checked.Follow these five steps to lock down Firefox. Start with the essentials in the browser\u2019s own settings, then choose some useful add-ons. Finally, keep track of your plug-ins so you can patch the inevitable security holes.<\/p>\n<h2>Enable a master password<\/h2>\n<p>Like other browsers, Firefox by default allows anyone who accesses your computer to log in to sites where you\u2019ve saved the password. And as with Google Chrome, a list of the saved usernames and passwords can be viewed via the Options menu of Firefox.<\/p>\n<figure class=\"left medium\"><a class=\"zoom\" href=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/05\/firefox_security_saved_passwords-100038558-orig.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/05\/firefox_security_saved_passwords-100038558-medium.png?resize=300%2C283\" width=\"300\" height=\"283\" border=\"0\" \/><\/a><figcaption>By default, nothing prevents others from viewing all your saved login info in Firefox.<\/figcaption><\/figure>\n<p>Fortunately, Firefox offers a master password feature that encrypts and password-protects the saved password list. When enabled, you must enter the master password the first time you use a saved password, once per browser session. Additionally, even though you enter the master password the first time, you must always enter it before you can view saved passwords via the Options menu. This is a great feature to help prevent casual snooping of your passwords. It even prevents most third-party utilities from recovering them.<\/p>\n<figure class=\"right medium\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/05\/firefox_security_enable_master-100038559-medium.png?resize=300%2C233\" width=\"300\" height=\"233\" border=\"0\" \/><figcaption>Creating a master password prevents others from using or viewing your saved login info.<\/figcaption><\/figure>\n<p>To enable the master password feature, open the Firefox menu, select <em>Options,<\/em> select the <em>Security<\/em> tab, and then check the <em>Use a master password<\/em> option.<\/p>\n<h2>Use a strong password for syncing<\/h2>\n<p>Like Google Chrome, Firefox has a syncing feature to synchronize your bookmarks, passwords, and other browser data to Firefox browsers running on other computers and devices. Fortunately, Firefox encrypts all synced data, not just your saved passwords (as Google Chrome does). Additionally, Firefox has more security than what Chrome offers by default when you\u2019re setting up a new computer or device to sync. In Firefox, you must log in with your Firefox Sync password. Then you must either enter a random passcode from the new device into one that you&#8217;ve already set up, or take the recovery key from a device you\u2019ve already set up and input that key into the new device.<\/p>\n<figure class=\"left medium\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/05\/firefox_security_sync_settings-100038561-medium.png?resize=300%2C322\" width=\"300\" height=\"322\" border=\"0\" \/><small class=\"credit\"><\/small><figcaption>Syncing conveniently syncs your saved login and other browser data across multiple computers.<\/figcaption><\/figure>\n<p>So you don\u2019t have much to worry about with Firefox syncing\u2014as long as you use a strong password, one with upper- and lowercase letters, numbers, and special characters. If someone knows or cracks the password, and has access to a device you\u2019ve already set up with syncing, they can then set up other devices with syncing and access your passwords and other browser data.<br \/>\nTo enable or change sync settings, open the Firefox menu, select <em>Options,<\/em> and select the <em>Sync<\/em> tab.<\/p>\n<h2>Verify that security options are enabled<\/h2>\n<p>Like other popular browsers, Firefox includes some basic security and privacy settings. Though most are enabled by default, you should ensure they haven\u2019t been disabled.<\/p>\n<figure class=\"right medium\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/05\/firefox_security_security_settings-100038560-medium.png?resize=300%2C322\" width=\"300\" height=\"322\" border=\"0\" \/><figcaption>Make sure the first three security options are selected to protect against malware and phishing attacks.<\/figcaption><\/figure>\n<p>Start by opening the Firefox menu and selecting <em>Options.<\/em> In the Options window, select the <em>Security<\/em> tab. Ensure that the first option, <em>Warn me when sites try to install add-ons<\/em>, is enabled to help prevent sites from automatically installing add-ons, as some can be dangerous. Then ensure that the next two options, <em>Block reported attack sites<\/em> and <em>Block reported web forgeries<\/em>, are also checked to help enable protection against malware and phishing.<\/p>\n<figure class=\"right medium\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/05\/firefox_security_privacy_settings-100038556-medium.png?resize=300%2C322\" width=\"300\" height=\"322\" border=\"0\" \/><figcaption>Check the first privacy option to help prevent websites from tracking your online activity.<\/figcaption><\/figure>\n<p>Next, select the <em>Privacy<\/em> tab. And if you want more privacy online, select the first option, <em>Tell websites I do not want to be tracked<\/em>, which isn\u2019t enabled by default. Although it can\u2019t prevent all tracking, it will reduce tracking by those sites that support this type of option.<\/p>\n<figure class=\"left medium\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/05\/firefox_security_content_settings-100038557-medium.png?resize=300%2C322\" width=\"300\" height=\"322\" border=\"0\" \/><figcaption>Ensure that the first content option here is enabled to block pop-ups.<\/figcaption><\/figure>\n<p>Now, select the <em>Content<\/em> tab. To prevent pop-up windows that can be annoying and even contain phishing ads, ensure that the first option is enabled: <em>Block pop-up windows<\/em>.<br \/>\nLastly, select the <em>Advanced<\/em> tab, select the <em>Update<\/em> subtab, and ensure that <em>Automatically install updates<\/em> is selected.<\/p>\n<h2>Use add-ons for more protection<\/h2>\n<p>Consider installing these security-related add-ons for extra protection:<br \/>\n<a href=\"https:\/\/addons.mozilla.org\/en-us\/firefox\/addon\/noscript\/\" target=\"_blank\">NoScript<\/a> helps you control which sites can use JavaScript, Silverlight, Flash, and other embedded content, as they can be used maliciously to infect your computer or for phishing attempts.<br \/>\n<a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/adblock-plus\/?src=search\" target=\"_blank\">Adblock Plus<\/a> blocks banners, pop-ups, and video advertisements on websites to reduce clutter and the resulting annoyance; they can even reduce accidentally stumbling upon adware, malware, and phishing attacks.<br \/>\n<a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/wot-safe-browsing-tool\/?src=search\" target=\"_blank\">Web of Trust (WOT)<\/a> shows the user ratings of sites and blocks dangerous sites\u2014such as those with malware\u2014to increase safe surfing, shopping, and searching on the Web.<br \/>\n<a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/https-finder\/?src=search\" target=\"_blank\">HTTPS Finder<\/a> automatically detects and enforces HTTPS\/SSL-encrypted connections when available\u2014great in helping to reduce the chances of an eavesdropper on a Wi-Fi network from capturing your login details.<br \/>\n<a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/162021\/\" target=\"_blank\">Xpnd.it! short URL expander<\/a> allows you to hover over shortened links to see the real URL and other basic information about the site so you know where it leads before clicking.<\/p>\n<h2>Check and update plug-ins<\/h2>\n<p>Cyber criminals regularly use vulnerabilities in popular browser plug-ins (like Java and Adobe products) to infect and invade computers. Most plug-ins regularly release updates to patch security holes. Many plug-ins are set by default to update automatically or at least to notify you of them. However, it\u2019s a good idea to check periodically for updates. Consider using the <a href=\"https:\/\/www.mozilla.org\/plugincheck\/\" target=\"_blank\">Mozilla plug-in checker<\/a> or third-party sites like <a href=\"https:\/\/browsercheck.qualys.com\/\" target=\"_blank\">Qualys BrowserCheck<\/a> for updates for other browsers.<\/p>\n<h2>A little vigilance goes a long way<\/h2>\n<p>Firefox is pretty secure on its own, but you can make it even more secure with the right settings and add-ons. Good password management remains essential, too: Create and enable a strong master password so others can\u2019t use or view your passwords. And if you use the syncing feature to synchronize your passwords and browser data across devices, use a strong password to prevent others from syncing. Finally, keep tabs on your add-ons and plug-ins to make sure they\u2019re giving you the best possible protection.<br \/>\nvia <a href=\"http:\/\/www.pcworld.com\/article\/2039455\/five-steps-to-ultimate-firefox-security.html\" target=\"_blank\">PCWorld<\/a><br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Over the years, many have touted Mozilla\u2019s Firefox as one of the most secure Web browsers. But as with other [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,9],"tags":[41,369,717,755],"class_list":["post-2380","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-adblock-plus","tag-firefox","tag-mozilla","tag-noscript"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-Co","jetpack-related-posts":[{"id":9450,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/11\/20\/are-passwords-immortal-security-now-690\/","url_meta":{"origin":2380,"position":0},"title":"Are Passwords Immortal? &#8211; Security Now 690","author":"NCCT","date":"November 20, 2018","format":false,"excerpt":"https:\/\/youtu.be\/mOSTtkK7vy0 Pwn2Own, the Future of Passwords. -- All the action at last week's Pwn2Own Mobile hacking contest -- The final word on processor mis-design in the Meltdown\/Spectre era -- A workable solution for unsupported Intel firmware upgrades for hostile environments -- A forthcoming Firefox breach alert feature -- The expected\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/mOSTtkK7vy0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9655,"url":"https:\/\/nccomputertech.com\/techtalk\/2021\/03\/09\/fuquay-varina-and-holly-springs-computer-repair\/","url_meta":{"origin":2380,"position":1},"title":"Fuquay Varina and Holly Springs Computer Repair","author":"NCCT","date":"March 9, 2021","format":false,"excerpt":"Welcome to our blog. NC Computer Tech services Fuquay Varina, Holly Springs, and surrounding NC areas. We offer prompt, professional, courteous service with over twenty years of experience dealing with residential and small business clients offering them solutions and fixing their computer and network issues at reasonable rates. Our services\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9938,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/google-antitrust-ruling-breakdown-what-this-means-for-chrome-and-search\/","url_meta":{"origin":2380,"position":2},"title":"Google Antitrust Ruling Breakdown &#8211; What This Means for Chrome and Search","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/ELXjmrnN1uM The panel breaks down the antitrust ruling that could force Google to sell Chrome, stop paying Apple billions for default search placement, and fundamentally reshape the internet. This is just one explosive topic from This Week in Tech - we also discuss AI's environmental impact and the government's security\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ELXjmrnN1uM\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9330,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/04\/03\/security-now-657-protonmail\/","url_meta":{"origin":2380,"position":3},"title":"Security Now 657: ProtonMail","author":"NCCT","date":"April 3, 2018","format":false,"excerpt":"https:\/\/youtu.be\/OeSZg-ph3Ns This week we discuss \"DrupalGeddon2\", Cloudflare's new DNS offering, a reminder about GRC's DNS Benchmark, Microsoft's Meltdown meltdown, the persistent iOS QR Code flaw and its long-awaited v11.3 update, another VPN user IP leak, more bug bounty news, an ill-fated-seeming new eMail initiative, Free electricity, a policy change at\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/OeSZg-ph3Ns\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9378,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/07\/13\/smart-home-security-tips\/","url_meta":{"origin":2380,"position":4},"title":"Smart Home Security Tips","author":"NCCT","date":"July 13, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ESqqAf3IGok Megan Morrone and Florence Ion talk to Stacey Higginbotham about tips for securing your smart home. The advantages and disadvantages of running devices on a guest network. Plus, how do you know if your devices are getting regular firmware updates.","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"https:\/\/nccomputertech.com\/techtalk\/category\/networking\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ESqqAf3IGok\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9930,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/fbi-says-toss-your-old-router\/","url_meta":{"origin":2380,"position":5},"title":"FBI Says Toss Your Old Router","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/scR199zRjvA On Security Now, Steve talks about the FBI's suggestion that we should be tossing out our old routers.","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/scR199zRjvA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/2380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=2380"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/2380\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=2380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=2380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=2380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}