SlideShare a Scribd company logo
1 of 17
WEB BROWSERS RAMON  BERROCAL  OLMOS GIMNASIO CAMPESTRE MONTERIA
INTERNET EXPLORER Release: 1995 Versions: 1, 2, 3, 4, 5, 6, 7, 8, 9. Security: Internet Explorer uses a zone-based security groups and sites on certain conditions, even if it's an Internet or Web-based intranet and a user on the white list. Security restrictions apply for each zone, all sites in an area subject to restrictions. Internet Explorer has been the subject of many security vulnerabilities and concerns: the majority of spyware, adware, and viruses transmitted via the Internet by exploiting the flaws and defects in the security architecture of Internet Explorer.
MOZILLA FIREFOX Release: 9  november  2004 Versions: 1.5, 2.0, 3.0, 3.5, 3.6, 4.0 Security: Firefox uses a security system sandbox.69 uses the SSL / TLS to protect communications with web servers using strong cryptography when using the protocolHttps.70.It has an antiphishing protection, antimalware and integration with antivirus. Display:Some users find that some sites may not display correctly in Firefox. However, this is a relatively rare and not specific to Firefox which occurs when web sites do not follow W3C standards.
GOOGLE CHROME Release: 2 - september - 2008 Security:The primary goals in designing the browser were to improve the safety, speed and stability than existing browsers offer. It also made major changes to the interfaceusuario.15 Chrome was assembled from 26 different code libraries from Google and other third parties such as Netscape.  Speed: Unanimously, with some evidence reported that Chrome performs much faster than all its competitors with which it has been compared, including Safari, Firefox 3, Internet Explorer 7 and Internet Explorer 8
PERA Release: 9  december  1996 Easy of use: It has little details that make their use more comfortable when browsing, such as a button "new tab" to view an option "paste and go 'for hyperlinks, duplicate tab, or the fact that in almost every section of the browser can perform an instant search. Security: Opera’s Fraud and Malware Protection warns you about suspicious webpages and is enabled by default. It checks the page you request against several databases of known phishing and malware websites, called a blacklists.
SAFARI Release: 7  january  2003 Versions:  ,[object Object]
1.1 released in October 2003
2.0 was released on April 29, 2005.
2.0.2 was released on October 31, 2005
Safari 3, was released on October 26-2007
Safari 4 was released on June 8-2009Easy of use: Includes tabbed browsing, spell checker, incremental find, view of history in Cover Flow, download manager and integrated search system.
MAXTHON Release: year 2000 Versions: 1, 2 and 3 Easy of use:  ,[object Object]
Split View - two pages at once in the same window.
Mouse gestures (above, below, close, open, reload, etc.).
Ad blocker and pop-ups.,[object Object]
AVANT Release: started in April 2002 Avant Browser is a ultra-fast. Its friendly interface brings a new level of clarity and efficiency to your browsing experience, and frequent updates continuously improve their reliability. Security: Avant Browser is free. 100% Free! No ads, no viruses, no spyware, no malware! With no hidden costs anywhere. Designed for use in private mode, Avant Browser will not store data on your computer.So if someone else uses your computer will not be able to see which sites and pagesyou visited.
DEEPNET Release: founded in 2004 Information: was created to develop more secure web browser with superior functionality and ease of use, and provide anti-phishing solutions that protect Internet users and organizations of the latest phishing scams.  Deepnet was the first to launch a web browser with RSS new reader and P2P client integration, the first to develop a browser based anti-phishing solution, and the first to introduce web password hashing in a web browser.

More Related Content

What's hot

How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
s1170166
 
Web Browser
Web BrowserWeb Browser
Web Browser
mandeag
 

What's hot (20)

Browsers
BrowsersBrowsers
Browsers
 
Internet explorer 06
Internet explorer 06Internet explorer 06
Internet explorer 06
 
Web browser
 Web browser Web browser
Web browser
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centre
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browser
Web browserWeb browser
Web browser
 
Browsers
BrowsersBrowsers
Browsers
 
Web browser(pp ts)
Web browser(pp ts)Web browser(pp ts)
Web browser(pp ts)
 
Web browsertico
Web browserticoWeb browsertico
Web browsertico
 
Web browser
Web browserWeb browser
Web browser
 
Web browers
Web browersWeb browers
Web browers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Browsers comparison
Browsers comparisonBrowsers comparison
Browsers comparison
 
Web browser by group no 03 capt palliyaguru
Web browser by group no 03   capt palliyaguruWeb browser by group no 03   capt palliyaguru
Web browser by group no 03 capt palliyaguru
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Develop your first app on Firefox OS
Develop your first app on Firefox OSDevelop your first app on Firefox OS
Develop your first app on Firefox OS
 
mozilla firefox
mozilla firefox mozilla firefox
mozilla firefox
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Web Browser
Web BrowserWeb Browser
Web Browser
 

Viewers also liked (11)

Ideas for billboard
Ideas for billboardIdeas for billboard
Ideas for billboard
 
Puberty
Puberty Puberty
Puberty
 
Our living world
Our living worldOur living world
Our living world
 
Evaluation media a2 2
Evaluation media a2 2Evaluation media a2 2
Evaluation media a2 2
 
Evaluation media a2
Evaluation media a2Evaluation media a2
Evaluation media a2
 
20 agosto-2012 sos terraplén la punta
20 agosto-2012 sos terraplén la punta20 agosto-2012 sos terraplén la punta
20 agosto-2012 sos terraplén la punta
 
Puberty
Puberty Puberty
Puberty
 
Evaluation media a2
Evaluation media a2Evaluation media a2
Evaluation media a2
 
Proxy design pattern
Proxy design patternProxy design pattern
Proxy design pattern
 
Глобальні тенденції HR 2017
Глобальні тенденції HR 2017Глобальні тенденції HR 2017
Глобальні тенденції HR 2017
 
Глобальні тенденції в HR 2017
 Глобальні тенденції в HR 2017 Глобальні тенденції в HR 2017
Глобальні тенденції в HR 2017
 

Similar to Web browsers (20)

Internet browsers by Andres Haydar
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres Haydar
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers .
Browsers .Browsers .
Browsers .
 
Trabajo de jose
Trabajo de jose Trabajo de jose
Trabajo de jose
 
Surfing of the internet
Surfing of the internetSurfing of the internet
Surfing of the internet
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
Browsers in the actuality.
Browsers in the actuality.Browsers in the actuality.
Browsers in the actuality.
 
browser of the actuality
browser of the actualitybrowser of the actuality
browser of the actuality
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
surfing of the internet.pptxsurfing of the internet.pptx
surfing of the internet.pptxsurfing of the internet.pptxsurfing of the internet.pptxsurfing of the internet.pptx
surfing of the internet.pptxsurfing of the internet.pptx
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Web browsers

  • 1. WEB BROWSERS RAMON BERROCAL OLMOS GIMNASIO CAMPESTRE MONTERIA
  • 2. INTERNET EXPLORER Release: 1995 Versions: 1, 2, 3, 4, 5, 6, 7, 8, 9. Security: Internet Explorer uses a zone-based security groups and sites on certain conditions, even if it's an Internet or Web-based intranet and a user on the white list. Security restrictions apply for each zone, all sites in an area subject to restrictions. Internet Explorer has been the subject of many security vulnerabilities and concerns: the majority of spyware, adware, and viruses transmitted via the Internet by exploiting the flaws and defects in the security architecture of Internet Explorer.
  • 3. MOZILLA FIREFOX Release: 9 november  2004 Versions: 1.5, 2.0, 3.0, 3.5, 3.6, 4.0 Security: Firefox uses a security system sandbox.69 uses the SSL / TLS to protect communications with web servers using strong cryptography when using the protocolHttps.70.It has an antiphishing protection, antimalware and integration with antivirus. Display:Some users find that some sites may not display correctly in Firefox. However, this is a relatively rare and not specific to Firefox which occurs when web sites do not follow W3C standards.
  • 4. GOOGLE CHROME Release: 2 - september - 2008 Security:The primary goals in designing the browser were to improve the safety, speed and stability than existing browsers offer. It also made major changes to the interfaceusuario.15 Chrome was assembled from 26 different code libraries from Google and other third parties such as Netscape. Speed: Unanimously, with some evidence reported that Chrome performs much faster than all its competitors with which it has been compared, including Safari, Firefox 3, Internet Explorer 7 and Internet Explorer 8
  • 5. PERA Release: 9 december 1996 Easy of use: It has little details that make their use more comfortable when browsing, such as a button "new tab" to view an option "paste and go 'for hyperlinks, duplicate tab, or the fact that in almost every section of the browser can perform an instant search. Security: Opera’s Fraud and Malware Protection warns you about suspicious webpages and is enabled by default. It checks the page you request against several databases of known phishing and malware websites, called a blacklists.
  • 6.
  • 10. Safari 3, was released on October 26-2007
  • 11. Safari 4 was released on June 8-2009Easy of use: Includes tabbed browsing, spell checker, incremental find, view of history in Cover Flow, download manager and integrated search system.
  • 12.
  • 15.
  • 16. AVANT Release: started in April 2002 Avant Browser is a ultra-fast. Its friendly interface brings a new level of clarity and efficiency to your browsing experience, and frequent updates continuously improve their reliability. Security: Avant Browser is free. 100% Free! No ads, no viruses, no spyware, no malware! With no hidden costs anywhere. Designed for use in private mode, Avant Browser will not store data on your computer.So if someone else uses your computer will not be able to see which sites and pagesyou visited.
  • 17. DEEPNET Release: founded in 2004 Information: was created to develop more secure web browser with superior functionality and ease of use, and provide anti-phishing solutions that protect Internet users and organizations of the latest phishing scams. Deepnet was the first to launch a web browser with RSS new reader and P2P client integration, the first to develop a browser based anti-phishing solution, and the first to introduce web password hashing in a web browser.
  • 18. PHASEOUT Flash Designed Skin Web Browser with all the latest protection shields: Anti Phishing Popup Killer and Clean Up tools with extended options, Integrated Advanced Search Tool Bar and Tabbed web windows with Floating Preview on mouse over, Side Bar History and Favorites extended tools.. Version 5.3 improvements: Option for selecting a Futuristic Default Default Skin and an Easy to use Windows XP classic environment skin, overall Speed Improvements, Better Compatibility, various bugs fixes. you can free download PhaseOut 5.4.4 now.
  • 19.
  • 20. 1.014 February 20061.55 June 20071617 April 20082018 November 2009Other important features include pop-up blocking, tabbed browsing and support for open standards.
  • 21. SEAMONKEY Release:10 march 2005 Containing an Internet browser, email & newsgroup client with an included web feed reader, HTML editor, IRC chat and web development tools, SeaMonkey is sure to appeal to advanced users, web developers and corporate users. Versions: 2.0.13 2.1 beta The SeaMonkey suite uses the same rendering engine and application platform as its sibling Mozilla Firefox, with popular features like tabbed browsing, feed detection, popup blocking, smart location bar, find as you type and a lot of other functionality for a smooth web experience.
  • 22. NETSURF Release: Speed: Efficiency lies at the heart of the NetSurf engine, allowing it to outwit the heavyweights of the web browser world. The NetSurf team continue to squeeze more speed out of their code.  General Web standards: HTML 4.01 and CSS 2.1 Image formats: PNG, GIF, JPEG, SVG, JNG, MNG and BMP Web page thumbnailing Local history trees URL completion Text selection Save pages complete with images
  • 23.
  • 24.
  • 25. end