ActiveX controls are Internet Explorer’s version of plug-ins. For example, Internet Explorer’s Flash player is an ActiveX control. Unfortunately, ActiveX controls have been a significant source of security problems.
ActiveX controls are essentially pieces of software and have access to your entire computer if you opt to install and run them. If you’re using Internet Explorer, websites can prompt you to install ActiveX controls — and this feature can be used for malicious purposes.
Flash Viewer Engine is a set of components for Delphi, C Builder and Lazarus which adds extra features to Adobe Flash Player (ActiveX or Netscape plugin) such as loading from any sources, grab real 32-RGBA frames, real transparency playing. For example, Internet Explorer’s Flash player is an ActiveX control. Unfortunately, ActiveX controls have been a significant source of security problems. What ActiveX Controls Are and Why They’re Dangerous. Chris Hoffman @chrisbhoffman May 5, 2013. Such as Adobe’s Shockwave Flash, Microsoft Silverlight, and Windows Media Player.
What ActiveX Controls Do
An ActiveX control is a small program for Internet Explorer, often referred to as an add-on. ActiveX controls are like other programs — they aren’t restricted from doing bad things with your computer. They could monitor your personal browsing habits, install malware, generate pop-ups, log your keystrokes and passwords, and do other malicious things.
ActiveX controls are actually not Internet Explorer-only. They also work in other Microsoft applications, such as Microsoft Office.
Other browsers, such as Firefox, Chrome, Safari, and Opera, all use other types of browser plug-ins. ActiveX controls only function in Internet Explorer. A website that requires an ActiveX control is an Internet Explorer-only website.
Security Concerns
![Activex Activex](https://i.ytimg.com/vi/S0gHKL5EbdY/maxresdefault.jpg)
You should avoid installing ActiveX controls unless you trust their source. Certain ActiveX controls are normal — for example, if you’re using Internet Explorer you probably have the Flash Player ActiveX control installed — but you should avoid installing other ActiveX controls if possible.
For example, while Oracle is a trustworthy corporation that isn’t out to infect your computer (unless you count the Ask Toolbar they slip into updates), the Java ActiveX control has security vulnerabilities and could be used to infect your computer. The more ActiveX controls you install, the more websites can take advantage of their problems to damage your computer. Reduce your attack surface by uninstalling potentially vulnerable ActiveX controls you don’t use.
Modern versions of Internet Explorer include features like ActiveX Filtering, Protected Mode, and “killbits” that prevent vulnerable ActiveX controls from running. Unfortunately, ActiveX controls are unsecure by their very design and nothing can be done to make them completely secure.
Managing ActiveX Controls
You can view the ActiveX controls you have installed by clicking the gear menu in Internet Explorer and selecting Manage Add-ons. Click the box under Show and select All add-ons.
You will probably have a variety of common ActiveX controls installed system-wide, such as Adobe’s Shockwave Flash, Microsoft Silverlight, and Windows Media Player. You can disable these from here, but you’ll have to uninstall them from the Control Panel if you want to remove them from your system.
To display ActiveX controls that you’ve downloaded via the browser, select Downloaded controls in the Show box.
To uninstall a control you’ve downloaded, double-click it and click the Remove button in the More information window.
In summary, ActiveX controls are dangerous and you should only install them if you need to do so and trust the source.
Sure, install the Flash Player ActiveX control — but if you’re browsing the web an a website wants to install an ActiveX control, you should probably decline the offer. Even if you do opt to install an ActiveX control from a trusted source, you should probably remove it when it’s no longer necessary to reduce your attack surface and help secure your computer.
READ NEXT- › How to Migrate Ext2 or Ext3 File Systems to Ext4 on Linux
- › What Is the Menu Key For? (and How to Remap It)
- › How to Use the vmstat Command on Linux
- › How to Scan (or Rescan) For Channels on Your TV
- › Why Video Doorbells Are the Best Smarthome Gadget