Saturday 30 March 2019

SAFE ONLINE BROWSING !! A myth ? which can become a dream come true if you follow these precautions .

In the Internet, it is very difficult to find a trustworthy website. We need to browse smart and most importantly we need to make sure the site is not dangerous by using Multiple approaches.

"Cyber criminals are using various sophisticated techniques to fool online users to drop malware and other cyber threats to cause unbearable damages. So we have to beware of the malicious website's, do not blindly open the website . Better check the website safety before open it."



In general, it is good to type the website URL instead of copy paste or clicking an URL. Also, checking to see the website working with HTTP OR HTTPS is much recommendable .


According to Google, in order to check, is this website Safe, Browsing is a service that Google’s security team built to identify unsafe websites across the web and notify users and webmasters of potential harm.

Here I am going to list few steps to follow :-

STEP 1

Investigating if the website safe or not !!!

In order to find, is this website safe , we need to figure it out if the URL received from an unknown source and we would recommend cross-checking the URL before clicking on it. Copy the URL to analyzers that available over the Internet and ensure it’s Integrity.

If it is a shortened URL you can unshorten it with the site and then analyze the actual URL.

STEP 2


Checking the website safety :

The first and the most recommended method is to check online page scanners, which uses latest fingerprinting technology to show web applications are up to date or infected by malware.

You can use Comodo Web Inspector which is more powerful, however, it would take more time. In another hand, it would be done a very depth analysis with the website and list possible malicious contents.Website reputation check needs to be done to find the trustworthiness of website with WOT .

You can try these these other scanners which are available :

1) Sucuri

2) Virustotal

3) Zelster

4) PCrisk


STEP 3

Checking the Website Safety & Reputation :

Analyzing a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites. This service helps you identify websites involved in malware incidents, fraudulent activities, and phishing websites.

Here are a list of important tools for checking the Website Reputation and confirm its Safety :





Check the Blacklist IP Address :
There are some awesome tools to Check the website IP Address has been listed in Global Blacklist Database.

Multirbl is a free multiple DNSBL (DNS BlackList aka RBL) lookup and FCrDNS (Forward Confirmed reverse DNS aka iprev) check tool to conform if this website is Safe or not.

STEP 5

Ensuring SSL is there before making online purchases :
In order to check website safety, Ensure the website availability with https before entering the payment card details. We can audit the HTTPS availability with the SSL analyzer URL’s available over the internet.

Also, there is a range of certificates available over Internet from low assured (domain validation) to the Most trusted Extended validation certificates, you can refer the URL for more details. 


Moreover, we can verify their prompt installation with various popular checkers available

1) SSLabs




STEP 6

Using a Proxy Server to Avoid Hacking :

The proxy server is designed to build up a wall between the user and the internet. The Internet is like a huge database where the data that a user needs to fetch is stored.The Proxy server helps as a wall between the database and the user so that no user can violate the storage system by any means.
But unluckily a particular hackers genre of people has been misguided or paid a huge amount for carrying out illegal activities that turn out to be harmful to the society. The Internet is playing a very crucial role in the present world, so Proxy server very essentially for personal security.

List of Top 10 Best Proxy Server and online Proxy











Above proxy servers are highly trusted and widely used to hide the identity and securely access your network and protect your asset from malicious hackers.


STEP 7

Surfing the web Using TOR BROWSER 

Tor browser ensures you by bobbing your communication around a distributed system of transfers keeps running by volunteers all around the globe.It prevents some person viewing your Internet connection from realizing what websites you visit, it prevents the websites you visit from learning your physical location, and it gives you a chance to get to websites which are blocked. Usage of a VPN (Virtual Proxy Network) is also recommended.


*POINT TO BE NOTED:

Within a couple of weeks hackers figured out to take control of 3000 routers, and they uncovered    beyond 95% of clients’ personalities!Some proof suggests that a lot of Tor hubs are being controlled by the NSA.The way that Tor’s leave nodes (routers) are having some security issues is likewise conceded by the organizers of Tor system, and it was the principle motivation behind why Agora, once a well-known darknet showcase, has ceased their operation.
Solution: I would Suggest TAIL - OS  if you want to go completely anonymous while browsing but it is upto you to choose according to your level of experience with these.

STEP 8

Browsing through Alternative Deep Web Search Engines :


Google has the ability to track your each and every move on the Internet while you are searching via Google .If  you don’t want Google to collect your personal information and your online activities you should maintain your Anonymity in online.“Deep web” Also known as “invisible web”, the term refers to a vast repository of underlying content, such as documents in online databases that general-purpose web crawlers cannot reach.

The deep web content is estimated at 500 times Bigger than Normal search contents, yet has remained mostly untapped due to the limitations of traditional search engines.


Since most personal profiles, public records and other people-related documents are stored in databases and not on static web pages, most of the higher-quality information about people is simply “invisible” to a regular search engine but we can get it from Deep Web Search Engine.

Here we go for the interesting Search Engines to get the deep search results which probably might not be aware by most of the people:

1)Pipl Search Engine

2)My Life Search

3)Yippy

4)SurfWax

5)Way Back Machine

6)Google Scholar

7)DuckDuckgo

8)Fazzle

9)Not Evil

10)Start Page

11)Spokeo


CONCLUSION  :

You can also report the bad websites when you come across one . Here are a few ways listed: 

Please report the dangerous URL to the services mentioned below. They are arranged in categories which should make it relatively easy to decide which services you should report the bad website to.

List of Services which Blacklist Dangerous Sites :-

1)Fortinet

2)Sophos

3)Trustwave

4)Bitdefender

5)Norton

6)Stopbadware

List of Services which Blacklist Phishing Sites :-

1)McAfee

2)AVG Threat Labs

3)Comodo Web Inspector

4)Malwarebytes

5)K7





































This is just written for the acknowledgement of the reader's from various other inspired sources and I am not responsible for any Legalities.

No comments:

Post a Comment