The attacks of third parties via the Internet that directly affect our web browsers, are becoming increasingly common, among other things because these are elements that we use almost constantly throughout the day.
While a few years ago these malicious attacks focused on the software as such, these now have other access routes that sometimes allow them to reach the confidential data of users more quickly and easily. And is that since a few years ago, the vast majority of Internet browsers have a support to make use of third-party applications, which are known as extensions or add-ons.
It is for this reason and among other reasons due to the widespread use of these third party programs that are implemented in the browser itself, that there are some of these malicious extensions whose main purpose is to access our private data, in one way or another.
In fact and knowing all this, there are already some of these supplements that, in addition to stealing information, use various techniques to make the removal of them more difficult for users, since in fact they block in large part, access to the configuration and management section of these.
As is logical to understand, with this blocking what is intended is that users of a particular browser can not, or at least it is more complicated, access to this section, from which in a few seconds we could eliminate the malicious element and thus stop the possible attack. However, in these lines we will show you how to avoid these blockages in most cases, and specifically using the two most popular proposals of the moment in this sector such as Google Chrome and Mozilla Firefox.
Start Chrome and Firefox in safe mode to erase extensions
If we refer to the first case, the search giant alternative , we always have the possibility to run the program with the start parameter “-disable-extensions“, so they will not be used, only from Chrome . Therefore, the solution here is to eliminate the malicious extension of the folder of our profile, we show you the most common locations of them:
Windows 7, 8.1 and 10: “C: \ User \ name \ AppData \ Local \ Google \ Chrome \ User data \ Default \ Extensions”
Mac OS X: “user / name / Library / Application Support / Google / Chrome / Default / Extensions ”
Linux: “/home/NAME/.config/google-chrome/default/Extensions “
Say that these plugins are usually listed with an ID , so it is best to locate the malware based on the modification date, although we can also open each folder and load the file “manifest.json” in a text editor.
On the other hand, Firefox users have it a bit easier, since they can start the browser in safe mode with all extensions disabled, also having access to these so that they can be removed from the “Add-ons” section. Similarly, the easiest way to start the Mozilla software in Safe mode is to hold down the ” Shift ” key when you start it and select ” Start in safe mode ” in the new window that appears, after that type ” about : addons “in the navigation bar and remove malicious extensions.