HOW-TO: Plug the Clipboard Security Hole

Do you find copy and paste to be a very handy tool? If yes, I share the same exact sentiment. But what if the clipboard (the limbo where the copied text goes to) is compromised by your browser? That very handy tool now becomes an annoyance rather than a useful utility, isnt it?

It is a very true fact that the text you stored in the clipboard (for copy and paste) can be stolen. Some experts call this the "clipboard hack". Websites can use a combination of javascript and ASP to send possibly sensitive data in the clipboard to another site or via email. The question then is: Is there a workaround to this? How is it done?

The answer to the question above is a definite "YES!". Read on as this post will discuss one of the many ways to safeguard yourself and plug the clipboard security hole.

Luckily the security hole exists only in the Internet Explorer (IE) browser (the hole also exists in Netscape but the browser seems to have been discontinued). However, IE happens to be used more than any other browser, and worse, the hole exists by default.

Plug the hole. In order to plug the hole, open a new instance of IE. From the menu bar, click on "Tools" and select "Internet Options"..


Doing so will open another window similar to the one below..


Open the Security tab..


Click on Custom Level and scroll down to "Scripting". Modify settings for "Allow paste operation via script" from Enable to Disable.


A warning pop-up window will immediately open after changing the security settings for this zone. Accept by clicking on the "Yes" button.

It is imperative to the same for the "Restricted Sites" zone. Nevertheless, if paranoia tells you to modify the other zones, do so.

IE needs to be restarted for the security change to take effect. The clipboard is now safe after the change.

Share:

Subscribe for Latest Update

Popular Posts

Post Labels

100gb (1) acceleration (1) acrobat (1) adblock (1) advanced (1) ahci (1) airdrop (2) aix (14) angry birds (1) article (21) aster (1) audiodg.exe (1) automatic (2) autorun.inf (1) bartpe (1) battery (2) bigboss (1) binance (1) biometrics (1) bitcoin (3) blackberry (1) book (1) boot-repair (2) calendar (1) ccleaner (3) chrome (5) cloud (1) cluster (1) compatibility (3) CPAN (1) crypto (3) cydia (1) data (3) ddos (1) disable (1) discount (1) DLNA (1) dmidecode (1) dns (7) dracut (1) driver (1) error (10) esxi5 (2) excel (1) facebook (1) faq (36) faucet (1) firefox (17) firewall (2) flash (5) free (3) fun (1) gadgets (4) games (1) garmin (5) gmail (3) google (4) google+ (2) gps (5) grub (2) guide (1) hardware (6) how (1) how-to (45) huawei (1) icloud (1) info (4) iphone (7) IPMP (2) IPV6 (1) iscsi (1) jailbreak (1) java (3) kodi (1) linux (28) locate (1) lshw (1) luci (1) mafia wars (1) malware (1) mapsource (1) memory (2) mikrotik (5) missing (1) mods (10) mouse (1) multipath (1) multitasking (1) NAT (1) netapp (1) nouveau (1) nvidia (1) osmc (1) outlook (2) p2v (2) patch (1) performance (19) perl (1) philippines (1) php (1) pimp-my-rig (9) pldthomedsl (1) plugin (1) popcorn hour (10) power shell (1) process (1) proxy (2) pyspark (1) python (13) qos (1) raspberry pi (7) readyboost (2) reboot (2) recall (1) recovery mode (1) registry (2) rename (1) repository (1) rescue mode (1) review (15) right-click (1) RSS (2) s3cmd (1) salary (1) sanity check (1) security (15) sendmail (1) sickgear (3) software (10) solaris (17) squid (3) SSD (3) SSH (9) swap (1) tip (4) tips (42) top list (3) torrent (5) transmission (1) treewalk (2) tunnel (1) tweak (4) tweaks (41) ubuntu (4) udemy (6) unknown device (1) updates (12) upgrade (1) usb (12) utf8 (1) utility (2) V2V (1) virtual machine (4) VirtualBox (1) vmware (14) vsphere (1) wannacry (1) wifi (4) windows (54) winpe (2) xymon (1) yum (1) zombie (1)

Blog Archives

RANDOM POSTS