Whether you want a bar for your intranet or to distribute to your clients, we can build it for you.
We can help you to make the transition from IE to Firefox. (
Why make the switch from IE to Firefox?  See the article below from US-CERT)

Would you like us to make a custom bar for your school, government agency, or business?
Drop us an email and we will get back to you as soon as possible.

Government request

School request

Business request

US-CERT Article
On August 13, 2004, US-CERT, a division of the Department of Homeland Security recommended, among other things, to use a browser other than IE.

The entire article from US-CERT can be found here

Here is an excerpt of the article which describes the problems with IE.

-The Problem
IE is vulnerable to a cross-domain violation that seems to involve a race condition, frames, and possibly the execScript method. When the location of the content of a frame is changed with an HTTP redirect response, a modal dialog box that was called from the frame before the redirect will return a cached reference to the frame's original domain. IE then incorrectly considers the cached domain instead of the redirected domain when determining the security domain of the modal dialog box. Also, since the contents of the frame have been changed by the redirect, it is possible to set the location object of the frame. By redirecting to a local resource, controlling the timing of the redirect, and setting the frame's location to a javascript: protocol URI, an attacker can execute script in the security context of the Local Machine Zone.

Functional exploit code is publicly available, and there are reports of incidents involving this vulnerability (Scob, Download.Ject, Toofeer, Berbew).

Any program that hosts the WebBrowser ActiveX control or used the IE HTML rendering engine (MSHTML) may be affected by this vulnerability.

By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE.

-Solution (one of a few recommended solutions)
Use a different web browser There are a number of significant vulnerabilities in technologies relating to the IE domain/zone security model, the DHTML object model, MIME type determination, the graphical user interface (GUI), and ActiveX. It is possible to reduce exposure to these vulnerabilities by using a different web browser, especially when browsing untrusted sites. Such a decision may, however, reduce the functionality of sites that require IE-specific features such as DHTML, VBScript, and ActiveX. Note that using a different web browser will not remove IE from a Windows system, and other programs may invoke IE, the WebBrowser ActiveX control, or the HTML rendering engine (MSHTML).

Systems Affected

VendorStatusDate Updated
Microsoft CorporationVulnerable5-Aug-2004

*as per Mozilla.org