|
Internet BrowsersHere are my notes on internet browsers. Let me know what you find helpful or missing. Thank you for not using Internet Explorer. You are using a downlevel browser. Browser detected: |
|
This article says that IE 11 is faster on various tablets.
There is a Touch version of IE 11 for tablets.
Apple discontinued their Windows browser as of 6/14/2013. The last Windows version (5.1.7) is available from Cnet.com/Download.com here.
Opening Browser WindowsWhen you click the Explorer application icon or from Program Files, an additional "IEXPLORE.EXE" process is created. This takes up more memory. Do this if you need another session, as if you are another user. However, when you pull down File > New > Window, you create another Task for the same process and session. Normally, only one version of IE can be installed on a Windows machine. However, standalone IE programs are available in zip files from Skyzyx. Microsoft states in its support Article ID 298618 that Internet Explorer 7 does not support the download of files over 2 GB in size via HTTP. |
|
User Agents for Compliance ModeThe first line of a HTML document is specified by ISO 8879. XHTML 1.1 is more recent than HTML 4.01. From a full list with discussion here. XHTML 1.1 should begine with: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> XHTML Strict should begine with: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> XHTML with Framesets should begin with: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Frameset//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-frameset.dtd"> HTML 4.01 Transitional with Framesets should begin with: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd"> HTML Transitional from v3 should begine with: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> HTML 4.01 Strict should begine with: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> XHTML Transitional should begine with: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> | XHTML Beginning XLST 2.0: From Novice to Professional, by Jeni Tennison (Apress, 2005, ISBN 1590593243). Beginning XML with DOM and Ajax: From Novice to Professional, by Sas Jacobs (Apress, 2006, ISBN 1590596765). |
Browser Wars
Internet browsers for PocketPC:
Internet browsers for Apple Macintosh only:
Internet browsers for Linux only:For desktops: | For $25/year, Proxify allows additional settings to hide your IP address so you can access websites from behind overly restrictive corporate firewalls.
There is, at least in the U.S., a TV ad for Microsoft's Internet Explorer 4.0 package which uses the musical theme from Mozart's Requiem.
“Where do you want to go today?” is the cheery line on the screen.
Meanwhile, the chorus sings in Latin “Confutatis maledictis, flammis acribus addictis," which translates to “The damned and accursed are convicted to flames of hell.”
Counter Exploitation (cexx.org) thoroughly investigates adware, spyware, foistware, etc.
that slows you down, crashes your computer, corrupts your hard disk, robs your privacy, etc.
Please help them with their fine work.
Spyware: Do You Know Who's Watching You - article from the 2001 CPSR Essay Contest.
|
|
Netscape & Mozilla browsers
From Mozilla.org''s Cross-Platform Front-End (XPFE) project emerged XUL (pronounced like "cool"), now called the XPToolkit project to make lightweight cross-platform cross-device user interfaces as easy to customize as Web pages. The new Netscape/Mozilla browser were constructed out of the XUL language. This enabled new features, such as downloadable chrome -- themes users can download to decorate the look and feel of their browser. Gecko, the layout rendering engine embedded in Mozilla, parses XUL to create the user interface on the fly. The namespace http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul. XUL uses event-driven Cascading Style Sheets (CSS) (not looping statements and conditional operations of XSL) to describe the "style" and behavior of XUL user interfaces. JavaScript is still the "glue" for event handling. The XML Binding Language (XBL) uses XML to create reusable composite widgets. XBL adds anonymous content, properties, and implementation methods to XML elements. The jXUL open source project creates a Java library for translating XUL into Java-based user interfaces. Essential XUL Programming (New York John Wiley & Sons, Inc. (US), 2001) by Bullard, Vaughn.; Smith, Kevin T.; Daconta, Michael C.
|
|
Where Browsers Store Stuff
In my Windows 95 computer:
|
| |
Browser Tricks (and Security Vulnerabilities)Microsoft Internet Explorer (MSIE)IE's integration with the operating system is a mixed blessing. In your Address bar, in addition to "http:" protocol commands, you can also type in operating system resource and file protocol commands. For example, click on this "res:" command to activate the "About" dialog:
Notice that this executes without the kind of warning you get when you execute the calculator program that comes on all Microsoft machines:
c:/windows/system32/calc.exe on Windows 9x & XP machines You can also specify files to be open on the Address bar:
file:///C:/Windows/win.ini on Windows 9x & XP machines You will see a Windows configuration file if you did not change the default file association that defines what program Microsoft invokes when you double-click on files with certain suffixes. By default, .ini files are opened with notepad.exe. This IE 5.5 and 6.0 browser vulnerability allows others to perform the actions above. External sites can cause Notepad to pop up using Microsoft's view-source protocol. This opens up the win.ini file on your computer's c: drive: Richard Smith points out that this is a vulnerability not blocked by pop-up blockers or virus checkers, yet your computer can be disabled when you inadvertantly open a malicious attacker's web page containing many lines of this code, which opens a large file, consuming all available memory.
Among ways to crash your computer using Microsoft's Internet Explorer 6 are these demo pages which will cause your "iexplorer.exe" process to crash: Netscape Navigator (NN)
If the colors of a Web page gives you a migraine, set Navigator to use your own default colors instead by checking the box for "Always use my colors, overriding document." In NN3 the box is under Options/General Preferences/Color. In NN4 the box is under Edit/Preferences/Appearance/Color.
|
SPACE bar to page down SPACE+Shift to page up ALT+SPACE+C to Close,
ALT+SPACE+R to Restore, Instead of clicking on the Back and Forward buttons, you can give your mouse a rest and use Alt and the Right arrow key to move forward, and Alt and the Left arrow key to move back. |
|
Browser Blocking Utilities
Anti-virus software such as McAfee is not enough. I use a personal firewall - Zone Alarm Pro to block annoying pop-up ads and (more importantly), attempts by robots on the net randoming probing for computers vulnerable for being taken over. SpywareSpyware, also called adware, is commonly defined as any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications can be bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else.Alexa Toolbar, Bargain Buddy, Bonzi Buddy, Brilliant Digital, Bullguard Popup Ad, CasinoOnNet, Clip Genie, Common Name, Cydoor, Download Receiver, Downloadware, Eaccelaration, Hotbar, IEPlugin, Internet Washer, MyWay Toolbar, Similar Singles, Srng, VirtualBouncer, WildTangent, nCase, vx2 (Transponder)
Annoying TechniquesAmong the unethical ways in the Spyware Encyclopedia:
Shareware Anti-malwareShareware programs are effective, albeit a little more work to download and install them all, since they each have a different role
Shareware Spybot S&D (Search and Destroy) (SpybotSD.exe) Notices changes to the Windows Registry with its own xSpybotSnD entry. I works alongside Freeware SpywareBlaster from Javacool Software doesn't scan but prevents the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted pests. Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox. Restrict the actions of potentially dangerous sites in Internet Explorer. Freeware Ad-aware from Lavasoft in Germany removes Gator. Bazooka Adware and Spyware Scanner from Kephyr Shareware SpywareGuard (sgbhp.exe and sgmain.exe) catches spyware re it's executed. Freeware Hijack This lists key areas of a computer's Startup list in the Windows Registry. This identifies programs automatically invoked at start-up in Registry key 'HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run' Cloudmark Anti-Fraud Toolbar browser plug-in (free beta version) blocks sites and IP addresses on their blacklist of known sources of malfeasance (spammers and those operating phising schemes) identified by the 1.3 million Cloudmark SafetyBar users who pay the $40 a year for MS Outlook. Comodo's TrustToolbar relies on a whitelist of known trusted sites identified by "the internet's only identity assurance infrastructure", idauthority.com, which researches the companies behind sites. Phishing.net's Clear Search Anti-Phishing. Beware of posers. Memory Watcher, which claims to help you watch your memory, actually installs the Peper Trojan. Hidden in the middle of its disclosure:
Among the commercial for-fee software:
None of these program could detect/clean the IE hijacker which directs all web pages to (spotresults.com, azjmp.com). The pernicious pest reinstalls DSO (Data Shared Objects) after Spybot attempts to delete it. This is because the pest exists in memory The DSOStop2.exe fixes the registry keys for signed and unsigned ActiveX pests. After boot up in Safe Mode to delete these hidden files:
Spy Ware Info.com rs detailed advice.
Winsock2 LSP-Fix to select inetadpt.dll and move all instances of it to the Remove (RHS) side. This is a rogue Layered Service Providers (LSP) inserted into Window's TCP/IP handler to intercept outbound data and divert it elsewhere.
Zone Alarm ConfigurationZone Alarm can be annoying because it does not offer a familiar Windows interface with pull down menus.When I tried to open an Adobe Acrobat (.pdf) file, I got “Page blocked” instead. But instead of turning off the program entirely to get to a page it blocks (very dangerous), I figured out how to better control the program. I change Zone Alarm configuration temporarily. In the Privacy tab, click Custom in the Mobile Code Control section. I uncheck “Block mime-type integrated objects”. This is because Adobe acrobat pdf files are a special mime-type. |
Test pop-up ad blocking software Block pop-up ads with $29 Meaya.com, ShieldsUp, and others mentioned in Webattack.com Opt-out from 3rd-party tracking cookies at the source -- those providing online advertising technologies.
|
|
Security Settings
SSL was developed by Netscape Communications Corporation in 1994 to secure transactions over the World Wide Web. Soon after, the Internet Engineering Task Force (IETF) began work to develop a standard protocol. They used SSL 3.0 as the basis for the TLS 1.0 (Transparent LAN service) protocol defined in their RFC 2246 published Jan. 1999, with extensions updated by RFC 3546 on June 2003.
Clients confirm the validity of a server’s credentials with a trusted root certification authority’s (CA’s) certificates loaded on the web server machine. So users don't need to establish accounts before they create a secure connection with a server. The sender create a one-way hash key from the data. This is sent along with the data. TLS uses the Message Authentication Code (HMAC) algorithm which is more secure than the SSL Message Authentication Code (MAC) algorithm. So TLS is used by public web sites that need to be highly secure, such as the website to submit Top Secret applicantions TLS doesn't use Fortezza algorithms because they are proprietary and thus not open for public review. One advantage of TLS is that it accepts intermediary authority certificates, whereas SSL prompts the user for a certificate all the way back to the root CA. The biggest disadvantages of using TLS 1.0:
| |
Firefox 3 is worth the extra download/install effot becoming of its speed, and especially extensions:
Beware that extensions can cause other Javascript apps (especially Google Apps) to behave strangely.
Download Firefox extensions, which have .xpi file extentions. Mozilla requires developer attention with each new major version. So extensions can die from developer neglect.
If your extension becomes obsolte, version compatibility can be forced using "Nightly Tester Tools" FF-Addon or manaully this way:
The <canvas< tag by HTML 5 will cause a major revolution in the web and in testing web applications. It replaces flash video plug-ins by enabling JavaScript to draw vector graphics.
See my notes on CSS
Related:
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page
Thank you! |