Free Essay

Internet Browsers

In:

Submitted By drewburnett01
Words 596
Pages 3
The browsers that I use are Google Chrome and Microsoft Internet Explorer. For this class, I mostly use Internet Explorer due to its compatibility with Blackboard vs. Chrome. At one time, I used Mozilla’s Firefox; however recently, I have found issues with the browser getting a little sluggish and decided to completely go to Chrome and save IE for when I absolutely could not use Chrome. Chrome has become a very well rounded browser from when it started. Currently, the version of Internet Explorer that I use is 9.0.8112.16421 and upon a quick check, it is the most current version.
Internet Explorer 9 has anti-phishing and anti-malware functionality. In Internet Explorer 9, the functionality is called SmartScreen filter. To check if it is turned on, you click your settings (or tools) icon, scroll to safety, and click Turn off (or on) SmartScreen Filter. This will launch the tool that allows you to select whether the setting is on or off. I believe this is a great feature of Internet Explorer 9 and my SmartScreen filter is always turned on. In addition, you can double check a suspicious site if you feel that SmartScreen missed it by going to tools, safety, check this website.
In addition to the SmartScreen filter, my Internet Explorer 9 browser is also set to block pop-up windows. There are a couple exceptions that I have added to the pop-up blocker which include the Pima Blackboard site and my corporate VPN site. To get to the settings for Java, I go to my Control Panel. Since I have Windows 7, I sort my Control Panel to an icon view and have an icon just for Java settings. The Java version that I am currently using is 6 update 31. This is the latest version of Java. Currently, I am auto-updating Java and they seem to come out fairly often, though the program is only supposed to check on the 13th day of the month. I usually do not uninstall the old version of Java unless I run into problems. I get to the Adobe Flash controls the exact same as Java by going to Control Panel. There is an icon just for Adobe Flash called Flash Player. The version of Adobe Flash that I am using is 11.1.102.62, which is the latest version. I also use the “Check for updates automatically” feature to keep this utility up-to-date. Interestingly enough, when picking through some settings within Adobe Flash, I found one called Local Storage Settings. It’s verbiage is as follows: “Local storage may be used by websites to save data about this computer’s use of Flash Player, such as viewing history, game progress, saved work, preferences, or data that identifies this computer.” To me this is a huge security risk and the default setting is “Allow sites to save information on this computer. ” Just image the people that do not realize this setting exists. The other options are “Ask me before allowing new sites to save information on this computer” and “Block all sites from storing information on this computer.” I have promptly blocked sites from storing information on my computer upon reading this as I feel it is the same setting as a cookie with a different data set. With so many sites utilizing Adobe flash player; I think that an attacker could use this data against me just like any other Temporary Internet File. I am glad that I found this setting in the course of the project.

Similar Documents

Premium Essay

Internet Technology and Web Browsers

...Internet Technology and Web Browsers American Military University How internet technology and web browsers have affected our daily lives. Today the internet touches every corner of the globe, and often is the main way an everyday person obtains information and communicates at home, school, or place of business. We can see how internet technology affects the entire globe by just a few simple clicks of a mouse or a simple touch of a screen with in a web browser to see a webcam in the arctic to teaching school kids in India. None of this would be possible without the idea of them being able to create hardware to connect computers to share their information with one another. Local area networks, wide area networks, and metropolitan area networks are computer networks that range in different geographic sizes and functions. We use them to communicate using devices such as computers, cell phones, and game consoles. These machines have worked their way into our daily lives through the way we work, live, and play with most people not even knowing the larger impact on how they shape our lives. This concept of information passing between computers has been around since the 1960s with universities obtaining more and more computers. Then the 1970s designed the standard for implementing how computers talk to one another using the OSI model and the suite of protocols called the transmission control protocol/internet protocol (TCP/IP) was...

Words: 1764 - Pages: 8

Free Essay

Internet Browser Research Paper

...Which Browser is Best: Determining the Benefits to Each Browser Which Browser is Best: Determining the Benefits to Each Browser The purpose of this research paper is to take the reviews from users to help highlight both the positives as well as the negatives of the top four widely used Internet browsers, which will ultimately help determine which browser is the best available for consumers to use. The purpose of this study is to determine which browser is the best out of the four, and to highlight the best features from each browser, and determine their significance on how each feature is. The significance of the study is to analyze the information given on each browser and translate it into information that Internet users can take away to help them determine which browser is the best one for them between Internet Explorer, Safari, Firefox, and Chrome. The Internet has become more readily available across the globe which has caused many software developers to create their own Internet browser. In the past couple of years there has been a flood of Internet browsers available for use (Bidgoli, 2009). When the Internet was only available in select countries there was only a select number of browsers that a user could use to access the Internet. The Internet is only going to become available to more people which will most likely bring more Internet browsers to the market. There are currently millions of users that are accessing the Internet daily and each browser...

Words: 3508 - Pages: 15

Premium Essay

Emerging Technology

...The Internet is all about various computers communicating with each other. The prevailing model of the Internet is the notion of clients and servers. You can understand this better by imagining a drive-through restaurant. As you drive to the little speaker, a barely intelligible voice asks for your order. You ask for your "cholesto-burger supreme," and the bored teenager packages your food. You drive up, exchange money for the combo meal, and drive away. Meanwhile, the teenager waits for another customer to appear. The Internet works much like this model. Large permanent computers called Web servers permanently host Web pages and other information. They are much like the drive-through restaurant. Users "drive up" to the Web server using a Web browser. The data is exchanged, and the user can read the information on the Web browser. What's interesting about this model is the interaction doesn't have to stop there. Since the client (user's) machine is a computer, it can be given instructions. Commonly, the JavaScript language is used to store special instructions in a Web page. These instructions (like the HTML code itself) don't mean anything on the server. Once the page gets to the client machine, the browser interprets the HTML code and any other JavaScript instructions. While much of the work is passed to the client, there are some disadvantages to this client-side approach. Programs designed to work inside a Web browser are usually greatly...

Words: 282 - Pages: 2

Premium Essay

Informatics Introduction Worksheet

...Internet Computing Assignment INFM 109 This assignment will get you used to using common internet computing components including web browsers, search engines, and email. These are all very basic tools that you are probably already very familiar with. However, they are the foundation for much of how we see and use the Internet. As you work through this assignment and later ones you will learn about other components of Internet Computing. Follow the directions below to complete this assignment. Fill in the required information as you work through the assignment. Highlighted areas like this: [highlighted area] require that you type in a response. This assignment is worth 15 points. 1. Open up your favorite web browser. * Name of the browser you are using: [Google Chrome] 2. Select one of the search engines below and then browse to and review the website listed below it which contains information on tips, tricks, and advanced search options for that particular search engine: * Google (www.google.com) * Google – Inside Search: http://www.google.com/insidesearch/tipstricks/ * Bing (www.bing.com) * Bingtricks – Bing Advanced Search: http://bingtricks.com/bing-advanced-search * Yahoo (http://search.yahoo.com/) * Yahoo! Help: https://help.yahoo.com/kb/search/SLN2242.html 3. Now that you have reviewed some of the advanced features of your chosen search engine, let’s use that skill set to do some research. Using...

Words: 422 - Pages: 2

Premium Essay

Economics - First Hw Assignment

...government also maintains that the company has used the power of its Windows monopoly to attempt to monopolize the market for Internet browsing software. In addition, government lawyers allege that the company has committed other anti-competitive acts. Microsoft contends that it is simply trying to innovate its products. The company contends that its actions are legal and says that there's no grounds of consumer indignation over the practices that the government is targeting. If the government wins at the trial court, it has already specified that it wants Microsoft to cancel contracts deemed exclusionary. In addition, the government wants Microsoft either to strip out its Internet browsing technology from Windows 98 or to include a rival browser made by Netscape Communications Corp. The plaintiffs alleged that Microsoft abused monopoly power on Intel-based personal computers in its handling of operating system sales and web browser sales. The issue central to the case was whether Microsoft was allowed to bundle its flagship Internet Explorer (IE) web browser software with its Microsoft Windows operating system. Bundling them together is alleged to have been responsible for Microsoft's victory in the browser wars as every Windows user had a copy of Internet Explorer. It was further alleged that this restricted the market for competing web browsers (such as Netscape...

Words: 959 - Pages: 4

Premium Essay

Davinci Crisis

...P3 Introduction On the 5th, November in 2013, few users found a huge bug for Sogou Browser which triggered fierce debate in the public. By logging on Sogou Browser with QQ account, thousands of other users' information can be seen and shared, included QQ, mailbox, alipay, banking and other account information relate to private property. Users can even make a transaction by using others' alipay account. P4 Influence of incident 1) most of the involved social media suggested users to change the password in case of further leakage. 2) according to CNZZ(a chinese statistical authority), the usage rate of Sogou Browser decreased from 6.40% to 5.82% within a week and the descending rate exceeded more than 10%. P5 Responses As we all aware, the golden eight hours would be the best time slot to save the company during the crisis management. This momentous web security leakage had exposed the privacies from a great deal of users, which even include the backs, paying codes in “zhifubao”. In order to minimize the damage level to the users, companies with moral and responsibilities would have done an emergency management, but unfortunately, Sougou had not. Instead, they claim that after a thorough investigation done by their tech team, there is no such a leakage problem, it is just an illicit competition from the competitor. Confront with this situation, 360 held a press conference to bring forth the evidences that against Sougou, point out their lies, which include the live...

Words: 979 - Pages: 4

Premium Essay

Information Market

...4. Do you think that information appliances like PDAs will replace personal computer (PCs) in business applications? Explain. Handheld microcomputer devices known as personal digital assistants (PDAs) are some of the most popular device in the information appliance category. Web-enabled PDAs use touch screens, pen-based handwriting recognition, or keypads so that mobile workers can send and received e-mail, access the Web, and exchange information such as appointments, to do lists, and sales contacts with their desktop PCs or Web server. PDAs have some advantages like smaller size, lighter weight and wireless network functions. They are widely used because of their mobility. For example, iPhone is a great product, and a lot of people are crazy about it. Everyday a vast number of people exchange e-mails and access all kinds of information on their iPhones very conveniently and quickly. However, I do not think that the information appliances like PDAs will replace personal computer (PCs) in the normal business applications. In this contemporary society, personal computers are regarded as formal office appliances because of their powerfulness and versatility. So, PDAs can hardly replace them in a couple of years because of their shortcomings. For example, they still cannot deal with big documents or save huge size information in their data storage. And because of their mobility, PDAs are always equipped with the touch screen without keyboard and mouse. It is kind...

Words: 1182 - Pages: 5

Free Essay

Html

...Advantages: * HTML is a free Language conceived by user for users * A HTML page could be read by any brand computers and provide the same result * Its distributed structure permits to exchange an element without change anything on the page where it is. This same element can be used many times without having to re designed it many times. * Network link: We can integrate local elements into a personal web page or to remote surfers and elements which we integrates address (URL). * Hypertext permits to manage different information without have to store them locally Advantages Easy to use Loose syntax (although, being too flexible will not comply with standards) Supported on almost every browser, if not all browsers. Widely used; established on almost every website, if not all websites. Very similar to XML syntax, which is increasingly used for data storage Free - You need not buy any software Easy to learn & code even for novice programmers Disadvantages * It cannot produce dynamic output alone, since it is a static language * Sometimes, the structuring of HTML documents is hard to grasp * You have to keep up with deprecated tags, and make sure not to use them * Deprecated tags appear because another language that works with HTML has replaced the original work of the tag; thus the other language needs to be learned (most of the time, it is CSS) * Security features offered by HTML are limited Disadvantages: ...

Words: 1032 - Pages: 5

Free Essay

Introduction to Computers

...Introduction to Computers and the Internet 2 1) Basic browser buttons: The same picture is blown up twice below, so that the labels are easier to read. 2) Favorites: A favorite (or a bookmark, depending on your browser) is a link to a page that you store in your web browser. This makes it easier to pull up that page because you do not have to remember its full address, search for it, or click through links on a page to get to it. If there is a page you want to remember or like to go to a lot, you may want to add it to your favorites. Here you can see the pages that are currently saved on your computer or add a new one. 3) Home Page(s): The home page is the page or pages that the browser pulls up when you first open it. You can set it to open more than one, and you can choose what it opens first. To do this, you will want to use the “home” icon. [pic] Clicking on the icon will make the browser pull up the home page, but by clicking on the arrow immediately to the left of it, you can set a new home page. Here you can see the current home page highlighted and the options to change or remove home pages. If you choose to add or change, you will see this: You can either make the page you are currently on the home page, or tell the browser to bring it up in addition to the page(s) it is already opening. If you find that you have too many home pages, you may want to remove some, like this: 4)...

Words: 355 - Pages: 2

Free Essay

New Communication Technologies-Short Essays

...ways of communication, something different what was used by previous generations or perhaps just a few years earlier. These new communication technologies certainly influence and change the way we live and manage our communication, social and business activities. One of these new communication technologies is the so-called “smart-phones”, which are the combination of cellular phones and computer based technology. “The growing capabilities of handheld devices and transmission protocols have enabled a growing number of inventive and fanciful applications—for instance, augmented reality” (Hosch Encyclopaedia Britannica2012) They incorporate a whole list of features, example touchscreen (which is almost a standard application these days) internet browser, high resolution camera, capable to take High Definition Videos apart from HD still shots, navigator, Mp3 music player, document viewer, Bluetooth, USB, alarm clock, calculator, calendar. It brilliantly works with Wi-Fi and after all, it is also capable to make phone calls too. Reference: smartphone 2012. Encyclopædia Britannica Online. Retrieved 25 February 2012, from http://www.britannica.com/EBchecked/topic/1498102/smartphone 2. Definition of technology & relevance - Posted: 28 FEB 2012 The definition of “Technology” by the Oxford Dictionaries: * The application of scientific knowledge for practical purposes, especially in industry:...

Words: 2863 - Pages: 12

Free Essay

Smash: Secure Cross-Domain Mashups on Unmodified Browsers

...SMash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers Frederik De Keukelaere, Sumeer Bhola, Michael Steiner, Suresh Chari, Sachiko Yoshihama {eb41704, sachikoy}@jp.ibm.com, {sbhola, msteiner, schari}@us.ibm.com IBM Tokyo Research Laboratory, Kanagawa, Japan; IBM T.J. Watson Research Center, New York, USA ABSTRACT Mashup applications mix and merge content (data and code) from multiple content providers in a user’s browser, to provide high-value web applications that can rival the user experience provided by desktop applications. Current browser security models were not designed to support such applications and they are therefore implemented with insecure workarounds. In this paper, we present a secure component model, where components are provided by different trust domains, and can interact using a communication abstraction that allows ease of specification of a security policy. We have developed an implementation of this model that works currently in all major browsers, and addresses challenges of communication integrity and frame-phishing. An evaluation of the performance of our implementation shows that this approach is not just feasible but also practical. The technology discussed in this paper allows mutually mistrusting client-side components to communicate safely without any modifications to current browsers, and hence has the potential to achieve immediate and widespread adoption. Categories and Subject Descriptors: D.2.0 [General]: Protection...

Words: 10150 - Pages: 41

Premium Essay

Nt1210 Unit 2 Assignment 2

...number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic mail Voice call-telephone calls Video frame-a rectangle of individual points of light of the video image, as frozen in time Web server-software that stores web pages and web objects, listens for requests for those pages, and sends the content of those pages/objects to clients. Web browser-is software that allows a user to get and display a copy of a web page from a web server. Web...

Words: 483 - Pages: 2

Premium Essay

Instructional Design Plan: Introduction to Internet Explorer

...Introduction to Internet Explorer Instructional Designer: James Smith Scenario The accounting division of ACME Global Transportation has recently implemented an Intranet that is to be used by the supervisory staff to access the new web based version of the corporate Human Resource Management System (HRMS). The new system is being phased in over a 90-day period. The supervisors are tasked with entering on-line, on a weekly basis, the regular and over-time hours worked by their staff. They are also supposed to print out a report of the hours that they have entered, and submit this to the manager of the department in which they work. They also have the option of sending the report to the manager via e-mail. The HRMS system is accessed via the corporate standard browser, Internet Explorer (IE). Thirty days into the implementation of the new HRMS package, the payroll manager has complained to the I/T director that the hours worked by staff are not being accurately captured. The department managers have also complained that they are not getting their payroll reports on a timely basis from their supervisors. A meeting was held to discuss the problems with the new version of the HRMS system. In attendance was the I/T team responsible for the HRMS project as well as the department managers and supervisors. In the course of the meeting it was discovered that the supervisors had received little or no training with Internet Explorer. The...

Words: 3947 - Pages: 16

Premium Essay

Android vs Ios

...google, users can customize almost all the basic features making it more user friendly .On the other hand, iOS is developed from UNIX and is owned by Apple cooperation. Android has the largest share in the world among majority smartphone platforms and other forms. Has widgets, increasing clients’ desire on the operating system. Google chrome is the default browser in android when it comes to internet access, however, other browsers such as opera mini and Mozilla firefox.Android is independent on the device it is being runon. Mostly found in devices such as Sony, Huawei and Samsung in different versions like gingerbread and lollipop. Mostfeatures cannot be customized by user .IOS is also independent on the device it is being run on. IOS kernel is usually not open source and thus difficult to root a phone running on iOS. Different versions are available such as iOS5.0 and iOS 7.1Available in devices such as ipones, ipads and ipads .IOS has no widgets but a dock where most frequently applications are used.IOS is available in 34 languages unlike androids 32 languages. Mobile safari is the default browser for the iOS.Third party browsers are available in the apple app store due to differing users taste. In a nutshell, both iOS and android are quality operating systems and developed to be used in touch interfaces. In both os there is a status bar displaying shortcuts of key features such as Wi-Fi and Bluetooth. They both are excellent operating system and decision is determined by the...

Words: 295 - Pages: 2

Premium Essay

Et1210

...Chapter 1 2 & 3 Review Questions Arcacia Godfrey 07/10/15 Mr. Gima (1). 1 bit represents one binary digit. (2). Kilobyte means approximately 106 byte. (3). 64 bits per quadruple word associated with each term. (4). The Random Access memory is used for short term memory and used to process data. (5). this is true the CPU tells the RAM which address holds the data that CPU wants to read. (6). A Character set determines in part what bits the computer stores. (7). the binary equivalent of decimal 123456789 stores in the RAM. (8). An Actuator arm is not a feature of a file system that might be used with a hard disk drive. (9). The Important features provides a convenient way to name a set of data for easier operations like copying and moving. The names gives users an easy way to reference the data and gives the CPU an easy way to identify the data it wants to read from RAM. (10). the classmate flash drive contents will not be usable by the classmate. (11). Changing the disk’s surface so that later the light will reflect differently for 0 or 1 describes how a hard disk drive physically writes a binary. (12). an internal hard disk drive is used for long term memory and connects to the CPU over a bus using a cable. (13). the components of an internal hard drive is an Actuator arm and platters. (14). RAM and optical disc drive are considered to be a solid state. (15). The Binary equivalent of decimal 123456789 the computer will need to consider. (16)....

Words: 1126 - Pages: 5