SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Introduction to How Firefox Works
A Web browser is sort of like the tires on your car.
You don't really give them much daily thought, but
without them, you're not going anywhere. The
second something goes wrong, you definitely
notice. Options are out there, however, and one of
them has been steadily chipping away at Internet
Explorer's dominance. It's called Firefox. From its
origins as an offshoot of the once-popular
Netscape browser, Firefox is building a growing
legion of dedicated users who spread their
enthusiasm by word of mouth .
Firefox History
When Firefox was still in the beta stage (when a
program hasn't been publicly released, but people
can download and use it to help find and fix
problems), it was already generating a healthy
buzz among tech-savvy Web surfers. In just four
months after the official release on Nov. 9, 2004,
an estimated 23 million people downloaded
Firefox. Web tracker OneStat.com reported on
Nov. 22, 2004, that Internet Explorer's share of
Web browser use had dropped five percent since
May of that year. Firefox had a user percentage of
4.5 percent. Current estimates have Firefox's
market share at nearly 20 percent.
Firefox Basics
There is much debate over the security of Web
browsers. Microsoft regularly releases patches
and updates to fix security holes in Internet
Explorer that might allow someone to install
malicious software or steal information from a
computer. Early on, Firefox was considered safer
than IE, but every program has its flaws. In fact,
just five hours after Firefox 3 was released, a
vulnerability was discovered in the browser's
code. Internet Explorer is sitll a bigger target for
hackers because more people use it, but as
Firefox becomes more popular among Web
browsers, that may change.
Firefox Features
Firefox comes with a few useful features that set it
apart from earlier versions of Internet Explorer --
so useful, in fact, that virtually every other
browser, including Internet Explorer, Opera, Safari
and Google Chrome, has also adopted them. One
of the most noticeable is tabbed browsing. If
you're browsing in Internet Explorer 6, and you
want to visit a new Web site while keeping your
current one open, you have to open a completely
new browser window. Firefox solves that by
allowing sites to open in separate tabs within the
same browser window. Instead of switching
between browser windows.
Firefox Extensions
Adblock Plus -- There are several different ad-
blocking extensions available in addition to the
pop-up blocking Firefox has built-in. These
extensions allow users to block some or all
banner ads and other advertisements that appear
on Web pages. Some use a list of known ad
servers or block images from servers with the
words "banner" or "adserver" in the domain name.
Others display ads normally, but if a user finds a
particular ad exceptionally annoying or obtrusive,
he or she can right-click on it and choose to
remove it in the resulting drop-down menu.
Firefox Security
Another aspect of Firefox versus Internet Explorer
security is the fact that Firefox is an open source
program. This means that anyone can access the
code in which the program is written. That might
sound like a bad idea, because you're giving
potential hackers access to the code; but in fact,
the opposite is true. There are far more people
who want to close security holes than there are
hackers who want to exploit them. Having
thousands of people looking over your code and
helping to spot problems means that most security
flaws will get fixed very quickly.

Weitere ähnliche Inhalte

Was ist angesagt?

Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021InternetDevels
 
Web Browsers11
Web Browsers11Web Browsers11
Web Browsers11Dyern
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 
popular windows applications
popular windows applicationspopular windows applications
popular windows applicationsMohsen M. Mirkhan
 
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Onsachettih
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3vcaaron
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3vcaaron
 
New gen web browsers and search tools
New gen web browsers and search toolsNew gen web browsers and search tools
New gen web browsers and search toolssushiaaron
 
Web browsers manuel zapata
Web browsers manuel zapataWeb browsers manuel zapata
Web browsers manuel zapataManuel Zapata
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPressJeff Hester
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsWardell Motley, NSA IAM\IEM
 

Was ist angesagt? (16)

Sw2
Sw2Sw2
Sw2
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Web Browsers11
Web Browsers11Web Browsers11
Web Browsers11
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
popular windows applications
popular windows applicationspopular windows applications
popular windows applications
 
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3
 
New gen web browsers and search tools
New gen web browsers and search toolsNew gen web browsers and search tools
New gen web browsers and search tools
 
Web browsers manuel zapata
Web browsers manuel zapataWeb browsers manuel zapata
Web browsers manuel zapata
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPress
 
Conficker
ConfickerConficker
Conficker
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface Applications
 

Ähnlich wie 無題 1

Ähnlich wie 無題 1 (20)

Prezen2
Prezen2Prezen2
Prezen2
 
Sp W11
Sp W11Sp W11
Sp W11
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Sw homework week11
Sw homework week11Sw homework week11
Sw homework week11
 
Week11
Week11Week11
Week11
 
Firefox
FirefoxFirefox
Firefox
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Firefox
FirefoxFirefox
Firefox
 
Getting Started with Firefox
Getting Started with FirefoxGetting Started with Firefox
Getting Started with Firefox
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
Week11
Week11Week11
Week11
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Browsers
BrowsersBrowsers
Browsers
 
Web browers
Web browersWeb browers
Web browers
 
Web browsers
Web       browsersWeb       browsers
Web browsers
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 

Mehr von s1170034 (20)

Stage6
Stage6Stage6
Stage6
 
Stage6
Stage6Stage6
Stage6
 
Stage5
Stage5Stage5
Stage5
 
英語2
英語2英語2
英語2
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
英語3
英語3英語3
英語3
 
英語3
英語3英語3
英語3
 
英語2
英語2英語2
英語2
 
Week4
Week4Week4
Week4
 
Week4
Week4Week4
Week4
 
英語
英語英語
英語
 
英語
英語英語
英語
 
7
77
7
 
7
77
7
 
7
77
7
 
4
44
4
 
9
99
9
 

Kürzlich hochgeladen

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Kürzlich hochgeladen (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

無題 1

  • 1. Introduction to How Firefox Works A Web browser is sort of like the tires on your car. You don't really give them much daily thought, but without them, you're not going anywhere. The second something goes wrong, you definitely notice. Options are out there, however, and one of them has been steadily chipping away at Internet Explorer's dominance. It's called Firefox. From its origins as an offshoot of the once-popular Netscape browser, Firefox is building a growing legion of dedicated users who spread their enthusiasm by word of mouth .
  • 2. Firefox History When Firefox was still in the beta stage (when a program hasn't been publicly released, but people can download and use it to help find and fix problems), it was already generating a healthy buzz among tech-savvy Web surfers. In just four months after the official release on Nov. 9, 2004, an estimated 23 million people downloaded Firefox. Web tracker OneStat.com reported on Nov. 22, 2004, that Internet Explorer's share of Web browser use had dropped five percent since May of that year. Firefox had a user percentage of 4.5 percent. Current estimates have Firefox's market share at nearly 20 percent.
  • 3. Firefox Basics There is much debate over the security of Web browsers. Microsoft regularly releases patches and updates to fix security holes in Internet Explorer that might allow someone to install malicious software or steal information from a computer. Early on, Firefox was considered safer than IE, but every program has its flaws. In fact, just five hours after Firefox 3 was released, a vulnerability was discovered in the browser's code. Internet Explorer is sitll a bigger target for hackers because more people use it, but as Firefox becomes more popular among Web browsers, that may change.
  • 4. Firefox Features Firefox comes with a few useful features that set it apart from earlier versions of Internet Explorer -- so useful, in fact, that virtually every other browser, including Internet Explorer, Opera, Safari and Google Chrome, has also adopted them. One of the most noticeable is tabbed browsing. If you're browsing in Internet Explorer 6, and you want to visit a new Web site while keeping your current one open, you have to open a completely new browser window. Firefox solves that by allowing sites to open in separate tabs within the same browser window. Instead of switching between browser windows.
  • 5. Firefox Extensions Adblock Plus -- There are several different ad- blocking extensions available in addition to the pop-up blocking Firefox has built-in. These extensions allow users to block some or all banner ads and other advertisements that appear on Web pages. Some use a list of known ad servers or block images from servers with the words "banner" or "adserver" in the domain name. Others display ads normally, but if a user finds a particular ad exceptionally annoying or obtrusive, he or she can right-click on it and choose to remove it in the resulting drop-down menu.
  • 6. Firefox Security Another aspect of Firefox versus Internet Explorer security is the fact that Firefox is an open source program. This means that anyone can access the code in which the program is written. That might sound like a bad idea, because you're giving potential hackers access to the code; but in fact, the opposite is true. There are far more people who want to close security holes than there are hackers who want to exploit them. Having thousands of people looking over your code and helping to spot problems means that most security flaws will get fixed very quickly.