SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
How Firefox Works
Firefox comes with a few useful features
that set it apart from earlier versions of
Internet Explorer -- so useful, in fact,
that virtually every other browser has
also adopted them. One of the most
noticeable is tabbed browsing. If you're
browsing in Internet Explorer 6, and you
want to visit a new Web site while keeping
your current one open, you have to open a
completely new browser window. Intensive
Web surfing can result in browser windows
cluttering up your taskbar and dragging on
system resources. Firefox solves that by
allowing sites to open in separate tabs
within the same browser window
Firefox also has a built-in pop-up
blocker. This prevents annoying ads from
popping up in front of the browser window.
You can configure it to let you know when
pop-ups are blocked and to allow certain
pop-ups from certain sites. This lets you
enable pop-ups that are useful windows as
opposed to unwanted ads.

One feature of Firefox that's vital to
some users is that it is a cross-platform
application. That means that Firefox works
under several different operating systems,
not just Windows.
Firefox Security
Firefox simply handles security
differently from Internet Explorer. Where
Internet Explorer uses security zones,
which can sometimes be confused by
malicious software, Firefox does not rely
on zones. Also, Firefox doesn't use
digital signatures. If you try to install
software on your computer, Internet
Explorer checks to see if the digital
signature matches the actual vendor of the
program.
ActiveX controls present another security
issue. ActiveX is built into Internet
Explorer and allows certain Web sites to
automatically download scripts or execute
small applications. While the absence of
ActiveX in Firefox does mean that some
sites will not be viewable, it also closes
many security holes; in this case, Firefox
chooses security over functionality.
Another aspect of Firefox versus Internet
Explorer security is the fact that Firefox
is an open source program. This means that
anyone can access the code in which the
program is written. That might sound like
a bad idea, because you're giving
potential hackers access to the code; but
in fact, the opposite is true. There are
far more people who want to close security
holes than there are hackers who want to
exploit them. Having thousands of people
looking over your code and helping to spot
problems means that most security flaws
will get fixed very quickly.

Mais conteúdo relacionado

Mais procurados

Web Browser
Web BrowserWeb Browser
Web Browser
mandeag
 
Firefox security (prasanna)
Firefox security (prasanna) Firefox security (prasanna)
Firefox security (prasanna)
ClubHack
 

Mais procurados (17)

Web Browser
Web BrowserWeb Browser
Web Browser
 
Web browsers
Web browsersWeb browsers
Web browsers
 
BROWSERS!
BROWSERS!BROWSERS!
BROWSERS!
 
News Bytes - May by corrupt
News Bytes - May by corruptNews Bytes - May by corrupt
News Bytes - May by corrupt
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
Web browers
Web browersWeb browers
Web browers
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Firefox security (prasanna)
Firefox security (prasanna) Firefox security (prasanna)
Firefox security (prasanna)
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
internet explorer
internet explorerinternet explorer
internet explorer
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtech
 
Browsers comparison
Browsers comparisonBrowsers comparison
Browsers comparison
 
Internet explorer 06
Internet explorer 06Internet explorer 06
Internet explorer 06
 
Internet
InternetInternet
Internet
 

Destaque (9)

Community Management in der Praxis
Community Management in der PraxisCommunity Management in der Praxis
Community Management in der Praxis
 
Einführung Social Media 22.10.14 Frauennetz Winterthur
Einführung Social Media 22.10.14 Frauennetz WinterthurEinführung Social Media 22.10.14 Frauennetz Winterthur
Einführung Social Media 22.10.14 Frauennetz Winterthur
 
Social Media for Companies
Social Media for CompaniesSocial Media for Companies
Social Media for Companies
 
Trends im Social Web
Trends im Social WebTrends im Social Web
Trends im Social Web
 
WordPress Zurich Meetup #5: mobilesport.ch insights
WordPress Zurich Meetup #5: mobilesport.ch insightsWordPress Zurich Meetup #5: mobilesport.ch insights
WordPress Zurich Meetup #5: mobilesport.ch insights
 
Blogwerk WordPress für die Corporate Website
Blogwerk WordPress für die Corporate WebsiteBlogwerk WordPress für die Corporate Website
Blogwerk WordPress für die Corporate Website
 
Anxiety Presentation
Anxiety PresentationAnxiety Presentation
Anxiety Presentation
 
Social Media for Deluxe Hotels
Social Media for Deluxe HotelsSocial Media for Deluxe Hotels
Social Media for Deluxe Hotels
 
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleitenCustomer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
 

Semelhante a Week11 (20)

無題 1
無題 1無題 1
無題 1
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
Sw2
Sw2Sw2
Sw2
 
Firefox
FirefoxFirefox
Firefox
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
Sp W11
Sp W11Sp W11
Sp W11
 
How Firefox Work
How Firefox WorkHow Firefox Work
How Firefox Work
 
Open source software
Open source softwareOpen source software
Open source software
 
Trabajo de jose
Trabajo de jose Trabajo de jose
Trabajo de jose
 
Browsers .
Browsers .Browsers .
Browsers .
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
Browsers in the actuality.
Browsers in the actuality.Browsers in the actuality.
Browsers in the actuality.
 
browser of the actuality
browser of the actualitybrowser of the actuality
browser of the actuality
 
Browsers
BrowsersBrowsers
Browsers
 
Slide
SlideSlide
Slide
 
About Firefox
About FirefoxAbout Firefox
About Firefox
 
Roy15
Roy15Roy15
Roy15
 
Presen4 1
Presen4 1Presen4 1
Presen4 1
 
Roy15
Roy15Roy15
Roy15
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Week11

  • 2. Firefox comes with a few useful features that set it apart from earlier versions of Internet Explorer -- so useful, in fact, that virtually every other browser has also adopted them. One of the most noticeable is tabbed browsing. If you're browsing in Internet Explorer 6, and you want to visit a new Web site while keeping your current one open, you have to open a completely new browser window. Intensive Web surfing can result in browser windows cluttering up your taskbar and dragging on system resources. Firefox solves that by allowing sites to open in separate tabs within the same browser window
  • 3. Firefox also has a built-in pop-up blocker. This prevents annoying ads from popping up in front of the browser window. You can configure it to let you know when pop-ups are blocked and to allow certain pop-ups from certain sites. This lets you enable pop-ups that are useful windows as opposed to unwanted ads. One feature of Firefox that's vital to some users is that it is a cross-platform application. That means that Firefox works under several different operating systems, not just Windows.
  • 4. Firefox Security Firefox simply handles security differently from Internet Explorer. Where Internet Explorer uses security zones, which can sometimes be confused by malicious software, Firefox does not rely on zones. Also, Firefox doesn't use digital signatures. If you try to install software on your computer, Internet Explorer checks to see if the digital signature matches the actual vendor of the program.
  • 5. ActiveX controls present another security issue. ActiveX is built into Internet Explorer and allows certain Web sites to automatically download scripts or execute small applications. While the absence of ActiveX in Firefox does mean that some sites will not be viewable, it also closes many security holes; in this case, Firefox chooses security over functionality.
  • 6. Another aspect of Firefox versus Internet Explorer security is the fact that Firefox is an open source program. This means that anyone can access the code in which the program is written. That might sound like a bad idea, because you're giving potential hackers access to the code; but in fact, the opposite is true. There are far more people who want to close security holes than there are hackers who want to exploit them. Having thousands of people looking over your code and helping to spot problems means that most security flaws will get fixed very quickly.