Is My Quick Converter Safe? (Review)

Is My Quick Converter Safe? (Review)

My Quick Converter is a program that can easily invade your Chrome, Firefox or Internet Explorer. It usually places a new toolbar, homepage or search engine on your default browser, which gives you access to certain sponsored content such as ads, sales offers, hot deals and related websites. (You can find our removal guide at the end of the article). In a way, this program may seem useful, especially to those users, who enjoy being offered sales ads, promotional banners, and pop-ups. However, many people find the above-described browser modifications and ads aggressive. Our “How to remove” team has recently received a lot of complaints, related to unauthorized search redirects and never-ending ad streams, caused by this program. Meanwhile, security experts warn that My Quick Converter may be categorized as a potentially unwanted program (PUP) from the browser hijacking type. If you’ve noticed that your homepage and search engine have been changed and the reason for that is My Quick Converter, it’s a clear sign that your browser might have been hijacked. Fortunately, browser hijacking is not a malicious action and you can easily deal with it without professional assistance. So, if you landed on this page to learn how to remove My Quick Converter from your browser, we suggest you uninstall it with the help of the removal guide below.

My Quick Converter
My Quick Converter

My Quick Converter is being criticized for its intrusive browser changes and safety issues! 

Browser hijackers are pieces of software, which often get criticized and even get mistaken for viruses. The reason is, they usually use a rather aggressive online advertising approach, which prompts users to click on various pop-up messages, new tabs, banners and sponsored sites. However, despite being categorized as aggressive, these pieces of software are not malicious. They do not attempt to cause harm to the users’ system, nor do they have harmful scripts. A lot of users get worried about the presence of programs like My Quick Converter in their browsers, but for their relief, we can firmly say that such programs do not initiate destructive actions similar to what a real virus (Trojan horse, Ransomware, Spyware, etc.) may run.

Still, if we have to advise our readers on what to do with a browser hijacker if it gets installed in their system, we would recommend them to have it uninstalled. The reason is such software may accidentally engage them in suspicious activity with the intention of promoting third-party web pages, raising their page rank, or receiving financial revenue through advertising. In addition, users may notice a new toolbar at the top of their browser’s menu or some unauthorized replacements of the homepage or the search engine. If this happens to you, you should be ready for permanent redirects to third-party web pages and exposure to various intrusive commercials. We do not need to say that these problems with the re-routing of My Quick Converter may become very annoying at some point. In addition, there is a risk of being redirected to Web pages that may not really be legitimate.

Unfortunately, the creators of browser hijackers usually disclaim responsibility for the inappropriate content you may be exposed to after clicking on any of the sponsored links, generated by their software. This means that you are solely responsible for the potential security risks and damages that might arise from clicking on the suggested content, which may not only be misleading but may also end you up with a nasty Trojan horse or a tricky Ransomware virus. With that in mind, you can decide for yourself if you need a program like My Quick Converter on your PC. If you decide to get rid of it, you will find instructions for removing the hijacker in the guide below.

How to stay safe from browser hijackers?

Many browser hijacking programs may have their official web page with an active download link. Therefore, users can download them directly from there. Undoubtedly, there is nothing wrong with this distribution method. But the creators of such ad-generating software also rely on another method known as software bundling, which allows installation on computers without the users’ knowledge. That’s why, to avoid being hijacked, you should be very careful when installing software bundles, especially setups that are distributed for free. These installers usually contain a main program, grouped with additional or recommended components, ready for installation. So, when you run the installer, they automatically become part of your system. To prevent that, instead of Quick or Basic settings, it is important to choose Advanced or Custom ones and check everything carefully. If you see an “I agree to set My Quick Converter as a default search engine” or “I agree to install the My Quick Converter Toolbar”, simply uncheck the checkboxes. This will disable the installation of the additional software and will protect you from all the above-mentioned browser hijacking problems.

My Quick Converter Removal Guide

I – Safe mode and revealing hidden files

  1. Boot your PC into Safe Mode /link/
  2. Reveal hidden files and folders /link/

II – Uninstallation

  1. Use the Winkey+R keyboard combination, write Control Panel in the search field and hit enter.
  2. Go to Uninstall a program under Programs.
  3. Seek the unwanted software, select it and then click on Uninstall

If you are unable to spot Hbpix “Virus”, search for any unrecognized programs that you do not remember installing on your PC – the unwanted software might disguise itself by going under a different name.

III – Cleaning all your browsers

  1. Go to your browser’s icon, right-click on it and select Properties.
  2. Go to the Shortcut tab and in the Target make sure to delete anything written after “.exe”.
  3. Now, open your browser and follow the instructions below depending on whether you are using Chrome, Mozilla or IE.
  • Chrome users:
  1. Go to your browser’s main menu located in the top-right corner of the screen and select Settings.
  2. Scroll down, click on Show Advanced Settings and then select Clear browsing data. Just to be sure, tick everything and clear the data.
  3. Now, in the left pane, go to Extensions and look through all extensions that are integrated within your browser. If you notice any suspicious add-on, disable it and then remove it.
  • Firefox users:
  1. Similarly to Chrome, go to the main menu and select Add-ons and then Extensions.
  2. Remove any suspicious browser extensions that you may have even if they do not have the name Hbpix “Virus” on them.
  • IE users:
  1. Go to Tools and select Manage add-ons.
  2. Click on all add-on types from the left pane and check if there is anything suspicious in the right panel. In case you find anything shade, make sure to remove it.

IV – Removing Shady processes

  1. Go to your start menu, type Task Manager in the search field and from the results open View running processes with Task Manager.
  2. Thoroughly look through all processes. The name Hbpix “Virus” might not be there, but if you notice any shady looking process that consumes high amounts of memory it might be ran by the unwanted program.
  3. If you spot the process ran by Hbpix “Virus”, right-click on it, open its file location and delete everything in there. Then go back to the Task Manager and end the process.

V – DNS check

  1. In the start menu search box write View Network Connections and open the first result.
  2. Right-click on the network connection you are using and go to Properties.
  3. Select Internet Protocol Version (TCP/IPv4) and click on Properties.
  4. If Obtain DNS server addresses automatically is not checked, check it.
  5. Go to Advanced and select the DNS If there is anything in the DNS server addresses field, remove it and click OK.
  6. Click OK on the rest of the opened windows. Pop-up “Virus” Android Removal

Browser hijackers can often be a real pain in the neck, especially when they infect your Android phone, tablet or other portable device. They tend to, among other things, affect your Chrome or Firefox browser and change its default search engine and homepage. Furthermore, they also start filling it with various online ads, such as popups and banners, and redirect you to pages you never wanted to open. One of the latest programs of this type is Pop-up “Virus” and we’re guessing that it’s also why you’ve landed on this page. Read on and find out just what this program is up to on your device and how you can remove it.

What is Pop-up “Virus” after?

Browser hijackers generally serve the online marketing industry and in doing so they are primarily designed to promote various products and services. That is why you see all those many ads all the time. But at the same time, they also make sure their developers profit by means of various remunerations models, such as the Pay Per Click scheme. These systems usually convert the clicks or taps of users such as yourself on the said ads into profit for the hijacker developers. With that in mind, you can see how vested they must be in generating more and more aggressive ads.

In addition to that, hijackers like Pop-up “Virus” often also take the liberty of exploring your browsing history and extracting valuable marketing information from it. For example, they can analyze your latest search requests and the websites you spend the most time on to determine the type of content you are more interested in. Then they can adjust the advertising campaign accordingly, and potentially make a bigger profit. This is often partly why programs like Pop-up “Virus” are often considered to be potentially unwanted.

But that’s not to say that they are viruses or malware of any kind. Hijackers do not possess any harmful traits like ransomware or Trojans do. Nevertheless, they still have the potential of exposing you to such threats, which is a good enough reason to get rid of Pop-up “Virus” as soon as possible. You can do that with the help of the removal guide we have prepared for you below. And from now on we recommend you first research any apps you would like to download onto your device before actually doing so. Browser hijackers like this one come integrated with various free apps and that way you will have a better chance of knowing if a given program contains a hijacker in it. Pop-up “Virus” Removal


Regardless of the type of browser you are currently using, be it the default “Internet” App or another one, such as Google Chrome, head over to:
Settings/More/Application Manager/All

Find the Browser or the App you’re using and tap on it.


Here you will basically be doing the same thing if you’re using the “Internet” App, or a different browser of your choice, such as Chrome or others. However, below are instructions for both cases:

For user of the “Internet” App:

Tap the Force Stop button.

Move down and tap the Clear Data and Clear Cache Buttons.

For Google Chrome Users:

Tap on  Force Stop.

Then tap on the buttons labelled as Clear Data and Clear Cache.


Restart your browser. You might want to consider rebooting your Android device, as well.

Were we able to help? Please help us, too, and spread the word!

A Freshmac Review (Is Freshmac Safe?)

One of the most asked questions in our comments seems to be “Is Freshmac safe?” Since we are a security website and we perfectly understand the importance of this question, we installed and tested Freshmac to determine whether the software lives up to its marketing, tag price, and if there are any shady practices it is involved in.

A quick aword: This review is intended to be completely objective. If you feel the author is biased, please write back to us in our contact form and inform us which part of the review you feel needs to be changed.

We will leave the comments section below open to anyone who wishes to leave an honest opinion, but if you intend to say the software is “the best” or “the worst” we will ask for proof of purchase. This is simply to make sure our readers can get an unbiased opinion. The last thing you or me want is for the people behind Freshmac or their competitors to start writing here.

Q: Is Freshmac safe?

A: Freshmac is a safe anti-malware program that can remove malware, adware and all other varieties of threats. It will also prevent new ones from installing themselves and act as a cleaner for your Mac.

You can download Freshmac from its official website.

BUT! Here is a very big caveat – this is a new software. It works perfectly right now, but we never know for how long the developers can keep up the quality. But still, our verdict is that Freshmac is not only safe to use, but your Mac can benefit substantially from it. As of the time we are writing this review there is almost no negative user feedback on Freshmac – and the negative feedback that does exist seems to focus solely on the price, which feels like these people hoping to get a free meal out of it. Mac optimizer/cleaners generally have a fishy reputation, for one simple reason: many  believe that free software can achieve the same results as a paid one.

Let me be loud and clear on this – paid software will always be head and shoulders above any free one you can find. Free software tend to be made by enthusiasts or companies that want to popularize through it their other services. In both cases, this means a very limited amount of resources (read: money) was invested in the project and the overall quality and support suffer from that.

Paid programs on the other hand are a “professional” class of software – everything negative about them starts and ends with the fact that you need to take money out of your wallet to use them. Yes, part of the profits are just that, profits for whoever created the software, but the same means that these people are more motivated to make the software better. This is when paid software truly begins to shine. In the case of Freshmac, my honest opinion on the matter as a security specialist is that if you value your machine and want to keep it secured, clean and fast – try Freshmac or another program of this type. If you regret the decision you can always cancel your subscription. The reason I recommend this to you is that nowadays more and more malware is targeting Mac devices and these figures will just keep growing.

My personal experience with Freshmac 

The first thing I did with Freshmac was run it on my old Macbook Air 2014 (the link is to apple’s website) just to see if it does anything at all. First impressions definitely raised my eyebrows a bit. As you can see on the screenshot below, according to Freshmac, my mac has 4474 issues on hand. To my knowledge, if there truly were that many issues, my mac would be garbage by now – so one negative strike here for overestimating the problems.

A closer look at the scan log reveals that 4248 of the 4474 issues were so-called “privacy” issues, which is to say many cookies and other browser-related stuff – the entirety of these 4000 issues resulted in a total of 4kb, which is vastly inferior to the other ones it found. Another mac I tested on had a whopping 66613 issues – again, about 99% of them being privacy issues.

A lot of programs do this. They count every single tracking cookie as a virus or a problem that needs to be fixed immediately. Without any context or explanation you are left without the full picture. What happens in reality here is that these “issues” are simply cookies that allow Google and other websites to offer you targeted ads – yes, the annoying kind, but hardly an “issue.” This is a marketing strategy that can be very misleading if you don’t understand what you are looking at.

Here is the good news:

There was a malware called Safe Finder on the second machine I tested (the one with 63000 issues). If you do a quick google search you will find that it is a huge issue that’s been plaguing users for years. The malware redirects users to shady websites and offers them unsafe advertisements – and Freshmac absolutely took care of it in a matter of seconds. The problem did not reoccur after. I am highly confident Freshmac is the best Mac cleaner if you are battling malware. I’ve been using a Mac for 8 years and I pretty much know how to clean it myself, but I was very pleasantly surprised to find out that it sped up at least 25%. I don’t have the necessary tool set to estimate exactly how much, but it was absolutely a noticeable difference. 

So, bottom line: despite confusing marketing, Freshmac performs well on all fronts and is definitely money well-spent.

If you liked my review of Freshmac, please like and share it!

Com.master.wallet Android Virus Removal

Browser hijackers can be the most annoying thing ever, especially when one finds its way on your android smartphone or tablet. Today we’re discussing a certain browser hijacker called Com.master.wallet Android Virus. It’s one of the newest versions of this type of software, but the symptoms are the same with pretty much any other variant: a changed homepage and possibly also search engine within your default browser, as well as numerous online ads, both within your browser and potentially also outside it. In the following few lines we will aim to explain what purpose Com.master.wallet Android Virus serves and what concerns you ought to have with it. In addition, at the end of it all we will show you how to remove this browser hijacker from your portable device.

What does Com.master.wallet Android Virus do and why is it on your phone/tablet?

Programs of this type are used as online marketing tools with the intention of promoting certain products and services by means of displaying popups, banners, new tabs and other online ads on the screen of your device. On the one hand, the distributors of the products and providers of the advertised services benefit from gaining more exposure. But on the other, the developers of programs like Com.master.wallet Android Virus benefit just as much, in fact – directly from the users’ interaction with the ads on their screens. This is possible through methods like the Pay Per Click scheme and other similar remuneration models.

Unfortunately, however, those tend to breed certain practices that many users and security experts alike disagree with. For one, browser hijackers like this one can often look through your browsing history to extract certain data from it, like the kind of content you tend to like and share on social media platforms, for example. They can also record the websites you visit and take special note of those you spend the most time on and/or favorite. All of this data can allow the hijacker to modify its flow of ads and try to relate to your preferences.

This, as well as the fact that programs of this type have the potential of exposing your device to various threats, like ransomware and Trojan horse viruses, is often the underlying reasons why people prefer to get rid of programs like Com.master.wallet Android Virus. And once you’ve done the same, you might want to research the apps you would like to download from now on. Browser hijackers come integrated with them, so it’s best to know beforehand if a certain app has a hijacker in it.

Com.master.wallet Android Virus Removal


Regardless of the type of browser you are currently using, be it the default “Internet” App or another one, such as Google Chrome, head over to:
Settings/More/Application Manager/All

Find the Browser or the App you’re using and tap on it.


Here you will basically be doing the same thing if you’re using the “Internet” App, or a different browser of your choice, such as Chrome or others. However, below are instructions for both cases:

For user of the “Internet” App:

Tap the Force Stop button.

Move down and tap the Clear Data and Clear Cache Buttons.

For Google Chrome Users:

Tap on  Force Stop.

Then tap on the buttons labelled as Clear Data and Clear Cache.


Restart your browser. You might want to consider rebooting your Android device, as well.

Were we able to help? Please help us, too, and spread the word!

Block Referral spam in Google Analytics

The referral spam in Google Analytics is a new breed of problem. This page is dedicated to eradicating it from your GA statistics.

If you have found yourself being harassed by referral spam called, then you’ve come to the right place. Here we will aim to tell you all about what this referral spam is, what it does and how it does it. Furthermore, we’ll also tell you just how much harm it is capable of inflicting on both you and your website. But what’s more important, we will also provide you with a set of instructions, which will help you get rid of and free yourself from its presence. You will find those under the removal guide below, but before you head on to the instructions, we would recommend that you read through the following information first.

What does referral spam represent and how does it operate?

First, a little history. Don’t worry, this won’t take long and is only necessary so you can understand what is really doing to you. To begin with, referral spam initially emerged in the form of what we now call classic referral spam. Basically, what this meant was that spammers would employ the help of things called bots and crawlers, so as to spam various different websites. They would program those bots and crawlers to generate hits on as many sites as possible, numerous times per site even, and with virtually no session time. This was done to prompt the website owners or admins to get curious enough so as to click back on this visiting websites and find out why it’s been opening their site and leaving it immediately after. And even if this didn’t succeed with everyone, you can imagine that even a fraction of the hundreds of thousands of targeted sites would still be able to generate sufficient traffic for the spamming website. And that is precisely what they aim to do: boost their rating by gaining more traffic, even if it’s through such a dishonest scheme.

After a while Google was able to catch on to this practice and eventually put a stop to it. And that’s when versions like started to appear. These are now known as ghost spam and are the new and enhanced version of the classic referral spam. They don’t require the use of bots and crawlers, unlike their predecessors. Instead, they go for your Google Analytics stats directly. That way they can simply make the impression that you’ve been visited numerous times by the spamming website, as opposed to having to make those hits. The good thing about this is that nothing but your stats is affected. This means that your actual traffic count and such remain untouched, so in other words – on the outside it’s like nothing ever happened. On the flip side, though, you may find it both annoying and hindering that your stats are getting polluted by all this fake data that keeps on getting entered by And that may, in fact, prove to be a problem, especially over time.

And this is usually the point where users make rash, uninformed and harmful decisions. One such decision is using the Referral Exclusion list as a means to block the referral spam. Because it contains the word ‘referral’ in it, right? So it must work! Wrong. Not only will it not help you remove the spam from your GA stats, it will actually worsen the issue and will cause you a whole lot more headache than you ever bargained for. First off, that’s not what the list is meant for. Secondly, once you enter the spammers in it, it will prompt GA to investigate the visits you’ve reported. But seeing as there were no visits to begin with (ghost spam, remember), it won’t be able to do anything about it and will go a step in the opposite direction by marking those visits and genuine traffic. Congratulations, now you will have them added to your actual traffic count.

Don’t cause yourself the extra trouble by going down that route. Instead, use the removal guide we’ve created for you below and have the issue done with. Your best shot at avoiding such future harassment from now on would be to consider switching to some better quality hosting. It is likely to provide you with better spam filters and, therefore, with better protection against referral spam like

Block in Google Analytics

Instruction #1: Enter your Analytics account.
After that load Admin and then – All Filters.

Instruction #2: After that, hit New Filter.
Next, add in the Filter Name value.

Instruction #3. Choose the Custom Filter Type. 
Once you see the Filter Field, go with Campaign Source.
Next, when you see the Filter Pattern text box, enter Confirm by clicking  the Save button you will see at the bottom.

How to block referrer spam using your .htaccess file

If you are aware of a way to access your .htaccess file, you will just have to write the  code below in there:


RewriteCond %{HTTP_REFERER} [NC,OR]

RewriteCond %{HTTP_REFERER}

RewriteRule .* – [F]

In case you are not aware of a way to access it, follow these instructions:

Access your cPanel account,
the go to File Manager.
After that you should mark the check-box ‘Document Root for’.
Then go to your webpage.
Another important tip: choose ‘Show hidden Files’.
After that select Go. 
Look for the .htacess file.

Once you find it,  rightclick it.
From the options that appear, select Code Edit.
Enter the code above and Save Changes. 

Hopefully, we have been helpful! Tell us in the comment section. We will be glad to read what your opinion is!

How To Enter Safe Mode

Why pressing F8 sometimes doesn’t enable Safe Mode for windows 8 and later

For years pressing F8 immediately after a reboot has been the default option to enable Safe Mode for all versions of Windows. This hasn’t changed for Windows 8 and Windows 10 either, yet for some people it just won’t work. The reason behind this is the fast boot feature developed by Microsoft. Fast boot, especially when Windows is written on a quick SSD drive, will load windows so fast that it is humanly impossible to press the F8 button in time.

How to enable Safe Mode for windows 8 and later versions.

  1. Navigate to your Desktop, then press Win+R buttons simultaneously
  2. In the box that appears type MSCONFIG
  3. Now click on the Boot tab, then select Safe boot with Networking.
  4. Click Apply, followed by OK. Now reboot your PC
  5. Whenever you are done using Safe Mode go back to this menu and remove the tick from the Safe Boot box

How to reveal hidden files and folders

How to reveal hidden files and folders

  • IMPORTANT! You can make hidden files and folders to become hidden again by following the exact same instructions!

in Windows 7

  1. Begin by going to your Desktop.
  2. Now you’ll need to open the Start menu. You can do this by clicking on your Windows start button – the button in the left corner of your screen with the Windows logo on it.
  3. Navigate to the Control Panel option (should be in the right-most column) and click on it.
  4. Now look for the the Appearance and Personalization link, click on it.
  5. Look for the Hidden files and folders, fill the check box named Show hidden files, folders, or drives.
  6. Use Apply, then OK and you are done.

in Windows 8

  1. Look at the  Windows 8 Start Screen and select the Control Panel app.
  2. Now go to the More Settings option.
  3. The more traditional Control Panel window will appear, click on the Appearance and Personalization link.
  4. You’ll need to find the Hidden files and folders section and fill the check box next to Show hidden files, folders, or drives.
  5. Apply, then OK. Done.

in Windows 10

  1. Open the file explorer (Win button + E button) and open any folder on your computer.
  2. In the upper-left side of the screen you’ll notice the File, Home, Share and View tabs. You need the View tab, click on it.
  3. To the right you’ll notice a checkbox labeled Hidden items. Click on it so that it is marked. Done!

How to add trusted sites to Internet Explorer 10 & 11

How to add trusted sites to Internet Explorer 10 & 11

This article will help you add trusted sites to Internet Explorer 10 & 11, as well as outline the benefits of doing so. Many people have trouble with different type of malware viruses and Trojan horses, because these viruses specialize in targeting the weak spots of their internet browser. Internet Explorer has accumulated a bad reputation over the years, but in reality the recent versions of IE are no worse than the competition. The main thing you need to do in order to make your browser safe is to disable your Java and Adobe Flash plug-ins.

It’s not the browser, it’s the plug-ins that are vulnerable

Adobe Flash and Java made the internet what it is today, but unfortunately they have outlived their usefulness. In fact, critical weaknesses remain in both products and these weaknesses cannot be fixed. It is now recommended for all internet sites to upgrade content written in Flash/Java to HTML 5.0 code, which Is much safer. Unfortunately, this upgrade process is slow and many sites have not even begun the update (or lack the resources to do it). A large portion of internet sites require complete rework, because they are basically build with these programs in mind. They require the plug-ins to be enabled in order to be used, but at the same time it is dangerous to do so everywhere else. Due to this, all major internet browsers decided to keep Flash and Java disabled by default since 2014-2015. Sites that make use of Adobe or Flash will display a warning display message that you need to enable the plug-in before you are able to see the content that requires it.

This is where trusted sites steps in to help.

When you designate a site to be a Trusted Site you are basically telling your browser that it has nothing to fear from these web pages. This allows the browser to drop some security checks – thus trusted sites load faster – but it also automatically creates an exception where Flash and Java are turned on if they are off by default.

If you keep those two plug-ins disabled by default (like you should) you will have to manually enable them for every page which you visit that also requires them. As expected, this gets tedious very fast. If you frequently visit certain web sites and you are confident that they are safe to use, then there is no reason not to add them to your browser’s list of trusted sites. As you are about to see, this is a very straightforward process that is also easy to use.

  • IMPORTANT! There is just one thing to keep in mind when you enter trusted sites – try to enter the site’s URL without any sub-directories. A site’s subdirectory is separated from the main URL with this symbol “/”. If you add a site’s sub-directory, then only this directory will be trusted and the other will be treated as unfamiliar. When adding sites simply copy-paste the site’s URL up to the first “/”.

How to add trusted sites to Internet Explorer browser:

Step 1:

Open your Internet Browser and look at the top-right corner. Click on the Gear button.

From the drop-down menu select Internet options.

Trusted sites IE

Step 2:

A new menu should open. Click on the Security tab.

Now click on the Trusted Sites green tick, then on the Sites button.

You can now add Trusted Sites in the window that opens.

  • Don’t forget to add the URL without any sub-sections of the site. Simply copy the address up to the first”/”.

Trusted sites IE 2

Step 3:

That’s all, you are done!

How to add trusted sites to Mozilla Firefox

How to add Trusted sites to the Mozilla Firefox browser

This article contains detailed instruction on how to add trusted sites to the Mozilla Firefox browser, as well a list of the benefits of doing so. Hopefully our readers will find it as a useful tool in their efforts to keep their computers more secure.

Why should you add Trusted sites to your browser?

It appears that actually a few people make good use of this excellent feature Firefox offers us. The benefits may not be immediately imminent, but they are there. Using trusted sites will both help keep your PC safe and reduce your annoyance when you have to deal with the security features that arrange for your safety.

When you add a site to the trusted sites you are basically telling your browser that this particularly site is perfectly safe. This allows Firefox to load the site more quickly and smoothly, possibly skipping some security checks along the way.

Another very important feature of using the Trusted sites option is that it will enable add-ons as an exception. Add-ons like Java, Adobe Flash and the ActiveX plug-in are a great security vulnerability for your browser. They can be exploited by many viruses in order to infect your computer without your knowledge. The worst viruses like Trojan horses and Ransomware are also very hard to detect by anti-virus software. Cutting all access points for those is the first (and best) line of defense for your computer. Because of this most internet browsers (Mozilla included) now keep Flash and Java disabled by default. Actually, there is a whole campaign that aims to phase out Java and Flash written content from websites and that campaign is supported by the owning companies. This is, however, a slow process and perhaps several years may have to pass before we stop seeing Java/Flash based content in the sites we visit.  And while stoping these two programs is something good and healthy for your computer, it is bound to some problems. The most obvious is that content written in Java or Flash will not be displayed unless you manually activate the plug-in for the page. This will get tedious very quickly if you have to do it for sites you already know to be safe and which you visit frequently.

By adding such sites to Firefox’s trusted sites you create an exception for the sites and all content will be properly displayed for your leisure. Of course, you have to be absolutely sure that any site you add to the Trusted sites section is really safe.

How to add trusted sites 

Step 1:

Open your Firefox browser, then click on the three horizontal lines in the top-right corner. From the drop-down menu select Options.

Trusted Sites FireFox

Step 2:

You are not inside the Settings menu.

Click on the Security tab, then on the upper Exceptions button.

Trusted Sites FireFox 2

Step 3:

You can now enter or remove the URLs of trusted site.

  • WARNING! When entering URLs please include the full address of the website, but without any sub-sections. A sub-section is divided from the main url by “/”. When you want to enter the address of the site include everything between the first “/” symbol, if any. If you add the address with the sub-section you’ll only flag the sub-section as a trusted site and the rest of the site will still be considered unsafe by the browser.

Step 4:

All done!

How to enable Trusted sites in Google Chrome

How to enable Trusted sites in Chrome and what are the benefits?

Adding trusted sites to your browser is a very useful utility option that many people overlook and in our opinion this is because they are not even aware of what it does. In this article we’ll speak about the benefits of adding trusted sites to your Chrome internet browser, as well as provide a detailed guide on how to do that.

On the benefits of using Trusted sites

When you add a website to your list of trusted sites you are basically telling your computer that this is a site you know to be safe. When you visit a site on your list of trusted sites Chrome will not perform its normal routine to ensure that the site is safe – this automatically means that a trusted site will load faster than an ordinary site. In addition to that trusted sites will have plug-ins like Adobe Flash, ActiveX and Java enabled even if they are normally disabled by default in your browser.

Keeping Adobe Flash, ActiveX and Java disabled is actually the default option in Chrome, because these three have had a long history of problems. Over the years multiple weaknesses were discovered within those programs, which allows for many different viruses to be installed. Dangerous things like ransomware and Trojan horses can make great use of these weak spots to infect computers with Java and Flash enabled. Unfortunately, much of the content online has been written in these two languages – videos, Ads and site features will often get disabled when Flash and Java are turned off. The Chrome browser has both Java and Flash turned off by default simply to protect its users. These can be turned back on for convenience, but that is simply not recommended as it puts your computer in unnecessary risk.

Of course, you always have the option of turning them manually in order to see the content that requires them, but this has to be done manually for every instance and every page. This can quickly get tiresome, especially for sites you are well familiar with and absolutely sure they are safe. This is where trusted sites comes in.

A site added to your list of trusted sites will have add-ons turn on as an exception. This will make all pages that contains code which requires those programs to load instantly and smoothly. Your computer will also eagerly receive Cookies from such sites without prompting for your permission.

How to enable Trusted sites in Google Chrome

Step 1:

Open Google Chrome and look at the top-ride side of the browser. Locate the three horizontal lines and click on them.

A drop-down window should appear. Select Settings.

trusted sites Chrome 2

Step 2

You are now in the Settings main menu. Scroll down to the very bottom and click on Show advanced settings…

The settings menu will be expanded with additional content.

Keep scrolling down until you reach the Network section and click on Change proxy settings…

trusted sites Chrome 1

Step 3

A new window should open. Select the Security tab.

Next click on Trusted Sites green tick, followed by the Sites button.

A new window should open. You can now input the addresses of your trusted sites.

  • IMPORTANT! It is a good idea to input as little of the site’s name as possible. Any sub-sections of the site that you add to the site’s address will restrict the trusted site privileges to apply only to that subsection of the site. Note that sub-sections will be separated from the main site’s address with this symbol “/”, so you need to select anything between the first “/” you see.

trusted sites Chrome 3