Five Valuable Google Chrome Extensions - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next AdBlock -2 Next


Don't like ads?  Well, the highly popular AdBlock that started with Firefox is also available for the Chrome browser to easily block online ads.  Users have a number of pre-compiled filters that they can apply.  It allows you to add custom URLs to block, while a whitelist ensures that you can continue to support sites you like. In addition, the latest version attempts to block most ads from being downloaded to hopefully speed up your browsing experience.

While the amount of time you interact with the Web browser might differ depending on individual job responsibilities, Paul Mah thinks it would be fair to say that many of us spend hours a day on the Web in the course of our work or personal interests.  As you can imagine, the presence (or absence) of quality plug-ins or browser extensions can enhance or impede our productivity.

Paul made the switch from Mozilla Firefox to Google Chrome earlier this year due to performance degradation that he found taxing to his productivity.  With extensions now supported in the stable release of Chrome, he thought it would be fun to take a look at some of the most useful extensions. These are his favorite Google Chrome extensions.

More Slideshows:

Spending Spree: IBM's 2010 Acquisitions IBM has been on a spending spree this year, snatching up companies that offer a wide array of technologies.

12 Hot Productivity Apps for Your iPhone and iPad Get more out of your iPhone or iPad with these hot apps.

Five Tips for a Well-Done Tech Resume A tech pro's resume has to match the speed of this fast-changing industry.

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.