Search the Community
Showing results for tags 'Browsing'.
Since Windows XP's end of support, and espicially in 2016 I have noticed that people often say that they have trouble loading web pages and have problems browsing and compatibility issues. As a result of this, I have compiled a list of browsers that work fine on Windows XP, and other info. Internet Explorer If you are using Internet Explorer 6/7 get Internet Explorer 8. While it can only load marginally more web pages than IE 6/7 can, it's a lot more stable and faster than both IE 6/7. I'd say you can load 50-60% of web pages with IE 8. Firefox The last version that supports Windows XP and Vista was released like, 3 weeks ago, so browsing with Firefox you can load basically everything. You would probably be able to do this until around late 2018, and I reccomend using Firefox on WinXP for this very reason. Chrome I think the latest version that supports Windows XP was released some time ago- Around a year i'd guess, so loading web pages won't be too hard. I'd guess around 85-95% of web pages load with Chrome, so Chrome isn't a bad option but certainly isn't the best. Netscape Navigator The latest version (That isn't AOL crap) was released in 1998, so it will almost certainly work but good luck loading any web pages at all. Opera Latest version supports Windows XP, but I have used Opera in the past (With Windows ME) and it was a bit of pig (no irony intended) to use. Uncommon/Obscure browsers AOL Explorer Rather bad browser discontinued in like 2006 but it's latest version does indeed support Windows XP. I'd say around 75-85% of webpages load in AOL. Avant From a quick bit of research, Avant does still support Windows XP. All webpages load in Avant. My second choice after Firefox. Safari for Windows No clue. Vivaldi Earlier than version 1.0 works for XP. Not sure how much browsing you could get down with it Chromium Same situation as Chrome. Midori That's for Linux -_.- SeaMonkey As of now, version 2.46 supports Windows XP, however version 2.49 will be the last version to support Windows XP. Probably my third choice after Avant. Qupzilla 2.0.1 It's latest version does still work with XP, despite not officially having compatibility. Waterfox 64-bit web browser for XP, however it hasn't worked on XP for quite some time. QtWeb A lightweight browser which supports Windows XP as of April 2017. Hope I helped! P.S. If I got something wrong, do tell me.
One of the most effective ways to keep your system secure and private while on the web is to implement a managed blacklist of sites you just won't allow your device(s) to visit. I have been developing a script that gathers data from various contributors around the web who have developed lists of badware web sites, and compiles the info into a blacklist of sites you REALLY DO NOT want to visit. The result is pressed into service by a very simple process: Adding blacklist entries into your hosts file. Windows uses the file %SystemRoot%\System32\drivers\etc\hosts. to allow you to pre-load your DNS cache. The intent is that if you have a server you'd like to name, but the name isn't provided by an online DNS service, you can name it in your hosts file. But what the hosts file can ALSO do is allow you to redirect name resolution to 0.0.0.0 for any number of sites that serve malware, ads, track you, or just deliver things you don't want to see. An attempt to access that named site just fails. Your computer never contacts it. If you put the right list into your hosts file, your system will automatically, and most importantly without noticeable ongoing overhead, just avoid visiting badware sites. That's it. It doesn't require decisions by you, and it doesn't cause extra software to run. And there's no cost; the information is freely available - and surprisingly well maintained. What you see in a practical sense is that your browsing experience becomes free from ads, you no longer see viruses and malware trying to come in, and your browsing experience even gets faster. No kidding. Let's say, for example, that a badware site is www.iservemalware.com... Maybe links to www.iservemalware.com are embedded in other people's web pages, in ad slots, for example, or in things you fear your kids might click on. Maybe it shows up as a link in an eMail. Or even worse, html that just opens the site as soon as you view the message. It'd be nice if something would just stop your computer from visiting such a bad site, right? One entry in the hosts file will do just that: 0.0.0.0 www.iservemalware.com Boom, your computer won't visit the online server for www.iservemalware.com again. Maybe you've already even added some of your own badware sites you've run across to your own hosts file. But wouldn't it be great if you could combine the web browsing experiences of other folks out there too? There are literally tens of thousands of bad web sites. Seriously. But that number is not infinite! I present to you, free of charge and with no strings attached, my HostsCompiler script: http://Noel.ProDigitalSoftware.com/files/HostsCompiler.zip It retrieves badware site data, processes it into a minimum size blacklist, and augments your existing hosts file. I've tested it on 64 bit Windows 7, 8.1, and 10, though it will probably also work on 32 bit systems and Vista and XP. To set it up: Unzip all the files into the same folder, open an elevated command prompt, CD into that folder, run HostsCompiler.bat by typing its name, it will prompt you to continue, and it will immediately go out and find lists of badware / malware / adware sites from online sources and add them to your hosts file. You'll be instantly protected against visiting nearly 50,000 known badware sites. You'll notice a positive difference in your browsing experience. Run it regularly - for example by scheduling it to run every day using the Windows Task Scheduler as I do - and you'll have a "set it and forget it" system that will keep itself up to date to block the latest servers showing up online with intent to turn you into a victim. For me the script literally runs to completion in 5 seconds. The online sources this script obtains the information from are the following at the time of this writing: http://winhelp2002.mvps.org http://malware-domains.com http://www.malwaredomainlist.com http://adaway.org http://someonewhocares.org http://pgl.yoyo.org http://www.quero.at I wish to acknowledge the fine people who publish the lists at the above sites for their contributions to enhanced online security, privacy, and browsing performance. The executables in my zip file are from the freely available GnuWin32 toolkit plus one I've written (SHOWTIME, a tiny command line executable for displaying the current time/date), and the script is editable and readable, with plenty of comments. It's designed to coexist with whatever else you do with your hosts file. If you have even the slightest worry over running this, I ENCOURAGE YOU to research the executables online and open HostsCompiler.bat in a text editor and learn how it works. Those of you wishing to schedule regular HostsCompiler runs will be interested in this excerpt from the script: :: Synopsis: :: :: HostsCompiler NoPrompt :: :: NoPrompt - (Optional) If specified, will avert the request for confirmation. :: :: :: Suggest scheduling this job with a command line similar to: :: :: HostsCompiler NoPrompt >>C:\Some\Path\HostsCompiler.log 2>&1 :: Be aware that this is batch script and that altering your hosts file is a bit geeky. It requires a little knowledge about how Windows works and the exercise of some care. Don't use this if you don't feel comfortable with manipulating files on your computer. Please let me know if you have any problems or suggestions about things that could be improved. I'd love to hear your experiences with this method of enhancing security. Mine have been good. After running this, if you find a site you'd like to visit no longer works, there are ways to determine what the host name is and whether it's being blocked by a hosts entry - e.g., choose F12 developer tools in Internet Explorer, go to the Network tab, enable tracing, navigate in your browser, and look for a Result of (Aborted) - and you need only comment out the entry in your hosts file to restore access. -Noel