MX Master
  • Content count

  • Joined

  • Last visited

Community Reputation

151 Excellent


About Galileusz

  • Rank
    Intermediate Mage

Profile Information

  • Gender Male
  • Location Northern Ireland

Recent Profile Visitors

7,711 profile views
  1. BugSir006 (she was on the forum today) often takes part in the discussion, but somehow it's hard for her to answer security questions. This is not the first time that security questions remain unanswered
  2. I did a browser security test.

    Have you seen any protective extension for Maxthon? Unfortunately, in this respect Maxthon is very lame. So you have to use what you have, to protect yourself and I do it through filters, scripts. Of course, I also have a good AV, VPN, Firewall (payable), and to some use I have two other browsers, better secured. It is a pity, that the developer does not listen to the users' voice and does not implement the possibility to install google chrome plugins. It would certainly contribute to the increase in the popularity of Maxthon.
  3. I did a browser security test.

    In Firefox, Google Chrome and similar browsers, you can protect yourself against fingerprinting using SafeScript. I use this plugin in SlimJet, WaterFox and blocks it perfectly. This is what I use: The NoScript plugin known from FireFox has just appeared for Google Chrome and similar browsers. But as usual, it will not be available for Maxthon.
  4. I did a browser security test.

    I protect Maxthon through AdBlock and scripts in Violentmonkey. And the test displays such a result for me: Maxthon
  5. CSS Exfil Protection

    CSS Exfil Protection is a browser extension for Mozilla Firefox and Google Chrome that protects data against CSS Exfil attacks. What is this CSS vulnerability again? The CSS Exfil vulnerability detailed in this lengthy post is a method attackers can use to steal data from web pages using Cascading Style Sheets (CSS). CSS - one of the building blocks of the modern web - is used by developers to control the look-and-feel of a website and is present on nearly every modern page on the internet. By crafting targeted CSS selectors and injecting them into a web page, an attacker can trick the page into sending pieces of data to a remote server (e.g. usernames, passwords, and sensitive data such as date of birth, social security numbers, and credit card numbers). The vulnerability test can be checked on this page: Would it be possible to adapt this plugin for Maxthon?
  6. [] youtube pauses on start

    I also have this problem. And the culprit is the Irydium script, and more specifically the "Play videos automatically" function. If it is exclusive, then the player black screen appears.

    You're right, rick, this is version

    For me, the download was correct. But if you have a problem, I uploaded the file here:
  9. MX UI issues... let's make a list!

    In that case, I need to reinstall Maxthon
  10. MX UI issues... let's make a list!

    Change the language to Polish and show the screenshot.
  11. MX UI issues... let's make a list!

    @BugSir006 This problem has been around for a long time.
  12. I ask the feature 3rd time !

    Ok, I didn't know which X you mean. And you're right, Maxthon warns you only when more than one card is open.
  13. I ask the feature 3rd time !

    That's why I wrote that you can block it. Then you will not be able to close it.
  14. I ask the feature 3rd time !

    Can not you just block the first card?