diff options
author | hackademix | 2018-07-01 01:01:23 +0200 |
---|---|---|
committer | hackademix | 2018-07-01 01:01:23 +0200 |
commit | eceae7187a6f0e9510bc1165f6977256b87f490f (patch) | |
tree | d943f1ec73c09efa70954dcedb55eac82a726148 /ReadMe.md | |
download | noscript-eceae7187a6f0e9510bc1165f6977256b87f490f.tar.gz noscript-eceae7187a6f0e9510bc1165f6977256b87f490f.tar.xz noscript-eceae7187a6f0e9510bc1165f6977256b87f490f.zip |
Initial commit starting at version 10.1.8.3rc4.
Diffstat (limited to 'ReadMe.md')
-rw-r--r-- | ReadMe.md | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/ReadMe.md b/ReadMe.md new file mode 100644 index 0000000..95b688d --- /dev/null +++ b/ReadMe.md @@ -0,0 +1,24 @@ +#NoScript Security Suite + +The best security you can get in a web browser! +Allow active content to run only from sites you trust, and protect yourself against XSS and Clickjacking attacks, "Spectre", "Meltdown" and other JavaScript exploits. +Fx52? <a href="https://noscript.net/getit">https://noscript.net/getit</a> + +<b>IMPORTANT</b> +<a href="https://forums.informaction.com/viewtopic.php?f=7&t=23974&p=94778">A Basic <b>NoScript 10 Guide</b></a> + +Still confused by NoScript 10's new UI? +Check this <a href="https://blog.jeaye.com/2017/11/30/noscript/">user-contributed NoScript 10 primer</a>. +and this <a href="https://hackademix.net/2017/12/04/noscript-quantum-vs-legacy-in-a-nutshell-2/">NoScript 10 "Quantum" vs NoScript 5 "Classic" (or "Legacy") comparison</a>. + +Winner of the "PC World World Class Award" and bundled with the Tor Browser, NoScript gives you with the best available protection on the web. + +It allows JavaScript, Flash, Java and other executable content to run only from trusted domains of your choice, e.g. your home-banking site, mitigating remotely exploitable vulnerabilities including Spectre and Meltdown. + +It protects your "trust boundaries" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology. + +Such a preemptive approach prevents exploitation of security vulnerabilities (known and even unknown!) with no loss of functionality where you need it. +Experts do agree: Firefox is really safer with NoScript ;-) + +FAQ: <a href="https://noscript.net/faq">https://noscript.net/faq</a> +Forum: <a href="https://noscript.net/forum">https://noscript.net/forum</a>
\ No newline at end of file |