Popular Topics

What is a secure browser?

Dragon Internet Browser
Plenty of info on the web site and updated frequently. Especially when it comes to functional speed, stability and convenience. I agree this sounds fishy that your ISP does'nt allow https sites Based on Chromium - the open-source Web browser project founded by Google - Epic is a browser that strips out every conceivable feature to maximise privacy. More of your questions answered by our Experts.

Latest Articles

The browser that doesn't sell you out

The Dragon encompasses all of the best features of Chrome. It includes an important feature every user needs to use the Internet in total safety today. Especially when it comes to functional speed, stability and convenience.

Comodo Dragon Web Browser includes stronger security features. Much like many of the other innovative Internet solutions offered by Comodo. IceDragon features privacy and performance enhancements over the Firefox core browser as well as additional features such as SiteInspector malware scanning, Comodo Secure DNS and improved social media functionality. The Internet has grown up.

Malware plagues the Internet. Venturing onto the Web today in an age in which one continually reveals social security, bank account and credit card numbers as well as a plethora of other sensitive data can be like walking down a hallway with portraits on the walls. Portraits with eyes that watch everything you do and people hidden behind them ready to take advantage, based on what you let them see!

The choice is yours! Both versions of Dragon feature security and privacy improvements over the originals and both feature additional Comodo tools and services. Our goal is to offer a secure, feature-enhanced alternative to both Chromium and Firefox user-bases while retaining the benefits and user experience of the original browsers.

If you prefer FireFox, try IceDragon. If Chrome is the browser for you, then why not give Dragon a whirl? For technical product questions visit our Support Home Page click on the "Submit a Ticket" link and select "Internet Security Support" from the dropdown menu and submit.

Check out our Online Help Guide for tips on how to use and configure our products and for detailed technical information. Go to the Help Guide. Our Forum is populated with fellow Comodo users and developers alike and can quite often be the quickest and friendliest way to find answers to questions that you have.

Own a Dragon that will:. It promises to make what would otherwise be a complex and uncertain process much simpler because it is easy to start out using HTTPS on a website and be sent back to non-HTTPS pages without realising it. Because it bounces your connection through a number of distributed nodes, it should obscure the public IP address you are connecting to the internet with.

The important thing to remember about Tor is that it is really an advanced privacy browser rather than a secure one, in that it includes no anti-malware technology and blocks plug-ins by design. Using Tor will be slower than with other browsers and it can be demanding to use to its full privacy potential. Some people think that anyone who uses Tor is trying to hide something. Of course they are right.

If privacy is that important, let them think what they want. Announced by Brendan Eich, co-founder of the Mozilla Project, Brave is an open source browser that offers a respectable Chrome, Safari, and Firefox alternative. Brave offers great speeds and advanced ad-tracking controls, ideal for the privacy-conscious who are also after a lightweight browser. Available for Windows, Linux and OS X users, Brave includes HTTPS Everywhere integration, blocks cookie capture, features a decent ad-blocker, and has an active developer community which is always improving the browser.

It's still a relatively new browser, so perhaps not as polished a product as it could be, and extension functionality is still lacking. Based on Chromium - the open-source Web browser project founded by Google - Epic is a browser that strips out every conceivable feature to maximise privacy.

It does not collect data about its users and comes with excellent built-in ad blocking. Despite eschewing plug-ins, a handful are available to make life a bit easier, for example password manager LastPass. Epic's one-click proxy does slightly slow browsing speed, although for high-spec machines this shouldn't be an issue. It is also a closed shop — a proprietary browser based on an open source project Chromium is unlikely to keep pace with the latter for updates and patches.

Why opt for a closed shop Google offshoot when there are actually open source alternatives available? Yandex is a Chromium re-skin with a pleasing, minimal UI that doesn't stray too far from Google Chrome in design and features, and can import your Chrome preferences. Normally when browsers run scans they become sluggish, and Yandex has tried to address this. The browser uses Opera's Turbo technology to optimise web pages that are underperforming or working across an unstable network.

Yandex also blocks website containing malicious content and protects passwords and bank card details that are stored. This means it makes your online payments more secure. In terms of its anonymity provisions, it prevents third parties from tracking your browsing behaviour and location.

Freenet is a peer-to-peer secure platform that allows communication and publishing without censorship and anonymous and secure web browsing. It stores encrypted data in a distributed, decentralised network. It supports Darknet and OpenNet technologies, through which connection with other users is facilitated.

This is an anonymous network which facilitates the secure and private exchange of messages. It utilises DarkNet technology to provide protection from tracking by third parties like internet service providers. VPNs work by connecting two computers securely and privately over the internet. The server then acts as an intermediary, requesting the web page from the site and sending it back to you.

That means the website can only see the VPN server - not the client device requesting it. This information is encrypted, meaning external parties can't see the information exchanged. VPNs also mask the location of the client, allowing you to access location-specific services in other countries. Read more information on VPNs here.

By Techworld Staff Aug 28,

Taking a Tour

Leave a Reply