Wednesday, 3 December 2014

Our browser if infected POODLE a loophole that enables hackers to hack + way to bridge the gap

As I pointed out in the news bulletin of hackers, it has a serious flaw in the SSL encryption protocol 3.0 and this means that all the server managers and users, as well as browsers such as Google Chrome or Firefox as well as Internet Explorer are vulnerable to several risks related to sensitive statements. Where hackers can detect your bass word as well as credit card information easily. For this you must do now to make sure whether your browser is locked loophole POODLE or not.

Way of knowing if your browser is infected:

Way of knowing if McCann browser infected loophole very simple POODLE, First you have access to the link underneath, then if the message appeared: (Warning! Your browser supports SSLv3. To disable SSLv3, follow these instructions.) This means that your browser infected and you should patches gap in your browser. If the message does not appear, or any other message, it means you are not infected appeared Vulnerability.

How to bridge the gap in your browser:

As well as a simple way and this will divide my explanation into two sections, the Department for users of Google Chrome and the Department of Firefox users:

For users of Google Chrome:
First you click right click on the icon Google Chrome and then go to the proprieties properties then went to the shortcuts and copy and paste the code below it immediately after "chrome.exe as shown in the picture below. (Do not forget to add a space between '' and (--ssl -version-min = tls1))

  CODE: --ssl-version-min = tls1

For Firefox users:
Just download this addendum:  SSL Version Control and will disable the SSL protocol V3 responsible for the security gap.

So you may be to protect yourself from a loophole POODLE in all web browsers.

Detection gap site:  :  ZAMP

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

Popular Posts