Winnow Anonymous Proxy 4.1

Booth, Angela
September 2004
Australian PC User;Sep2004, Vol. 16 Issue 9, p56
Product Review
Reviews the Winnow Anonymous Proxy 4.1 Web browsing protection software.


Related Articles

  • SurfAnonymous 1.0.1. Booth, Angela // Australian PC User;Sep2004, Vol. 16 Issue 9, p56 

    Reviews the SurfAnonymous 1.0.1 Web browsing protection software.

  • Mozilla patches 'extremely critical' Firefox flaws.  // Network World;5/16/2005, Vol. 22 Issue 19, p6 

    This article reports that the Mozilla Foundation has patched two extremely critical security holes in its Firefox browser.

  • SHOULD YOU JOIN THE BROWSER WARS? Kirkpatrick, David // Fortune;11/29/2004, Vol. 150 Issue 11, p204 

    Discusses the dangers of web surfing, which include viruses and spyware. The growing popularity of Firefox, browser software designed to replace Microsoft's Internet Explorer; Why Microsoft's browser is a target; Observation that, so far, spyware and viruses do not affect Firefox much;...

  • TRUE ANONYMOUS BROWSING.  // Techlife Australia (Bauer Media Group);May2014, Issue 24, p80 

    The article offers tips on how to use the Onion Router (Tor) Browser Bundle web browser. An overview about the capability of the application to keep the user anonymous and hidden when browsing the internet is provided. Also offered are steps on how to set up the Tor Browser Bundle with details...

  • IE Security Flaws Spike Interest in Alternative Browsers. Goth, Greg // IEEE Internet Computing;Nov/Dec2004, Vol. 8 Issue 6, p8 

    This article focuses on security flaws of the Internet Explorer (IE) scrutinized by computer-security organizations and the media. Such security flaw compelled the U.S. Computer Emergency Readiness Team (US-CERT) to mention the possible use of alternative browsers as a safety measure. One...

  • Is Web 2.0 Safe?  // PCWorld;Jul2007, Vol. 25 Issue 7, p18 

    The article examines whether the fast-evolving collaborative model of Internet development known as Web 2.0 is safe from the Samy worm, a virulent bug created by Samy Kamkar that no firewall could block. The worm was among the more prominent of a new generation of Web attacks that some security...

  • How Private--or Secure--Is So-Called Private Browsing? Larkin, Erik // PCWorld;Dec2008, Vol. 26 Issue 12, p50 

    The article focuses on the privacy and security of the so-called private browsing features of major browser software like Firefox, Internet Explorer 8, Safari and the Google Chrome. While the features should prove effective in that situation, they will not disguise users from the sites they...

  • FIREFOX HOLES. A.C.K. // Entrepreneur;Jul2005, Vol. 33 Issue 7, p50 

    Reports on the need for entrepreneurs to update the browser security of their FireFox or Internet Explorer through Secunia's software monitoring website. Claim that FireFox users will know whether its time to update when a small, red and white arrow icon appears on the right of the menu bar;...

  • BUGS & FIXES. Larkin, Erik // PCWorld;May2009, Vol. 27 Issue 5, p38 

    The article discusses various computer bugs affecting Adobe and Internet Explorer (IE) 7. Bugs that infected IE came from a malicious Word document. Internet Storm Center (isc.sans.org) believed that the culprits might have hidden a code to a hijacked Web site to create a drive-by download...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics