We can create a custom Firefox toolbar for you, your department, or your entire organization.  We can help to give your agency or school, a safe and secure browser* and the flexibilty of the Firefox Toolbar.
Contact us

Why make the switch to Firefox from IE?

On August 13, 2004, US-CERT, a division of the Department of Homeland Security recommended, among other things, to use a browser other than IE.
The entire article from US-CERT can be found here

Here is an excerpt of the article which describes the problems with IE.

The Problem
IE is vulnerable to a cross-domain violation that seems to involve a race condition, frames, and possibly the execScript method. When the location of the content of a frame is changed with an HTTP redirect response, a modal dialog box that was called from the frame before the redirect will return a cached reference to the frame's original domain. IE then incorrectly considers the cached domain instead of the redirected domain when determining the security domain of the modal dialog box. Also, since the contents of the frame have been changed by the redirect, it is possible to set the location object of the frame. By redirecting to a local resource, controlling the timing of the redirect, and setting the frame's location to a javascript: protocol URI, an attacker can execute script in the security context of the Local Machine Zone.

Functional exploit code is publicly available, and there are reports of incidents involving this vulnerability (Scob, Download.Ject, Toofeer, Berbew).

Any program that hosts the WebBrowser ActiveX control or used the IE HTML rendering engine (MSHTML) may be affected by this vulnerability.

II. Impact

By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE.

*as per Mozilla.org