SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
How Firefox Works
Firefox comes with a few useful features
that set it apart from earlier versions of
Internet Explorer -- so useful, in fact,
that virtually every other browser has
also adopted them. One of the most
noticeable is tabbed browsing. If you're
browsing in Internet Explorer 6, and you
want to visit a new Web site while keeping
your current one open, you have to open a
completely new browser window. Intensive
Web surfing can result in browser windows
cluttering up your taskbar and dragging on
system resources. Firefox solves that by
allowing sites to open in separate tabs
within the same browser window
Firefox also has a built-in pop-up
blocker. This prevents annoying ads from
popping up in front of the browser window.
You can configure it to let you know when
pop-ups are blocked and to allow certain
pop-ups from certain sites. This lets you
enable pop-ups that are useful windows as
opposed to unwanted ads.

One feature of Firefox that's vital to
some users is that it is a cross-platform
application. That means that Firefox works
under several different operating systems,
not just Windows.
Firefox Security
Firefox simply handles security
differently from Internet Explorer. Where
Internet Explorer uses security zones,
which can sometimes be confused by
malicious software, Firefox does not rely
on zones. Also, Firefox doesn't use
digital signatures. If you try to install
software on your computer, Internet
Explorer checks to see if the digital
signature matches the actual vendor of the
program.
ActiveX controls present another security
issue. ActiveX is built into Internet
Explorer and allows certain Web sites to
automatically download scripts or execute
small applications. While the absence of
ActiveX in Firefox does mean that some
sites will not be viewable, it also closes
many security holes; in this case, Firefox
chooses security over functionality.
Another aspect of Firefox versus Internet
Explorer security is the fact that Firefox
is an open source program. This means that
anyone can access the code in which the
program is written. That might sound like
a bad idea, because you're giving
potential hackers access to the code; but
in fact, the opposite is true. There are
far more people who want to close security
holes than there are hackers who want to
exploit them. Having thousands of people
looking over your code and helping to spot
problems means that most security flaws
will get fixed very quickly.

Weitere ähnliche Inhalte

Was ist angesagt? (17)

Web Browser
Web BrowserWeb Browser
Web Browser
 
Web browsers
Web browsersWeb browsers
Web browsers
 
BROWSERS!
BROWSERS!BROWSERS!
BROWSERS!
 
News Bytes - May by corrupt
News Bytes - May by corruptNews Bytes - May by corrupt
News Bytes - May by corrupt
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
Web browers
Web browersWeb browers
Web browers
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Firefox security (prasanna)
Firefox security (prasanna) Firefox security (prasanna)
Firefox security (prasanna)
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
internet explorer
internet explorerinternet explorer
internet explorer
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtech
 
Browsers comparison
Browsers comparisonBrowsers comparison
Browsers comparison
 
Internet explorer 06
Internet explorer 06Internet explorer 06
Internet explorer 06
 
Internet
InternetInternet
Internet
 

Andere mochten auch

Community Management in der Praxis
Community Management in der PraxisCommunity Management in der Praxis
Community Management in der PraxisBlogwerk AG
 
Einführung Social Media 22.10.14 Frauennetz Winterthur
Einführung Social Media 22.10.14 Frauennetz WinterthurEinführung Social Media 22.10.14 Frauennetz Winterthur
Einführung Social Media 22.10.14 Frauennetz WinterthurBlogwerk AG
 
Social Media for Companies
Social Media for CompaniesSocial Media for Companies
Social Media for CompaniesBlogwerk AG
 
Trends im Social Web
Trends im Social WebTrends im Social Web
Trends im Social WebBlogwerk AG
 
WordPress Zurich Meetup #5: mobilesport.ch insights
WordPress Zurich Meetup #5: mobilesport.ch insightsWordPress Zurich Meetup #5: mobilesport.ch insights
WordPress Zurich Meetup #5: mobilesport.ch insightsBlogwerk AG
 
Blogwerk WordPress für die Corporate Website
Blogwerk WordPress für die Corporate WebsiteBlogwerk WordPress für die Corporate Website
Blogwerk WordPress für die Corporate WebsiteBlogwerk AG
 
Anxiety Presentation
Anxiety PresentationAnxiety Presentation
Anxiety Presentationjinu101
 
Social Media for Deluxe Hotels
Social Media for Deluxe HotelsSocial Media for Deluxe Hotels
Social Media for Deluxe HotelsBlogwerk AG
 
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleitenCustomer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleitenBlogwerk AG
 

Andere mochten auch (9)

Community Management in der Praxis
Community Management in der PraxisCommunity Management in der Praxis
Community Management in der Praxis
 
Einführung Social Media 22.10.14 Frauennetz Winterthur
Einführung Social Media 22.10.14 Frauennetz WinterthurEinführung Social Media 22.10.14 Frauennetz Winterthur
Einführung Social Media 22.10.14 Frauennetz Winterthur
 
Social Media for Companies
Social Media for CompaniesSocial Media for Companies
Social Media for Companies
 
Trends im Social Web
Trends im Social WebTrends im Social Web
Trends im Social Web
 
WordPress Zurich Meetup #5: mobilesport.ch insights
WordPress Zurich Meetup #5: mobilesport.ch insightsWordPress Zurich Meetup #5: mobilesport.ch insights
WordPress Zurich Meetup #5: mobilesport.ch insights
 
Blogwerk WordPress für die Corporate Website
Blogwerk WordPress für die Corporate WebsiteBlogwerk WordPress für die Corporate Website
Blogwerk WordPress für die Corporate Website
 
Anxiety Presentation
Anxiety PresentationAnxiety Presentation
Anxiety Presentation
 
Social Media for Deluxe Hotels
Social Media for Deluxe HotelsSocial Media for Deluxe Hotels
Social Media for Deluxe Hotels
 
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleitenCustomer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
Customer Decision Journey» Kunden erfolgreich bei der Kaufentscheidung begleiten
 

Ähnlich wie Week11

Ähnlich wie Week11 (20)

無題 1
無題 1無題 1
無題 1
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
Sw2
Sw2Sw2
Sw2
 
Firefox
FirefoxFirefox
Firefox
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
Sp W11
Sp W11Sp W11
Sp W11
 
How Firefox Work
How Firefox WorkHow Firefox Work
How Firefox Work
 
Open source software
Open source softwareOpen source software
Open source software
 
Trabajo de jose
Trabajo de jose Trabajo de jose
Trabajo de jose
 
Browsers .
Browsers .Browsers .
Browsers .
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
Browsers in the actuality.
Browsers in the actuality.Browsers in the actuality.
Browsers in the actuality.
 
browser of the actuality
browser of the actualitybrowser of the actuality
browser of the actuality
 
Browsers
BrowsersBrowsers
Browsers
 
Slide
SlideSlide
Slide
 
About Firefox
About FirefoxAbout Firefox
About Firefox
 
Roy15
Roy15Roy15
Roy15
 
Presen4 1
Presen4 1Presen4 1
Presen4 1
 
Roy15
Roy15Roy15
Roy15
 

Kürzlich hochgeladen

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Week11

  • 2. Firefox comes with a few useful features that set it apart from earlier versions of Internet Explorer -- so useful, in fact, that virtually every other browser has also adopted them. One of the most noticeable is tabbed browsing. If you're browsing in Internet Explorer 6, and you want to visit a new Web site while keeping your current one open, you have to open a completely new browser window. Intensive Web surfing can result in browser windows cluttering up your taskbar and dragging on system resources. Firefox solves that by allowing sites to open in separate tabs within the same browser window
  • 3. Firefox also has a built-in pop-up blocker. This prevents annoying ads from popping up in front of the browser window. You can configure it to let you know when pop-ups are blocked and to allow certain pop-ups from certain sites. This lets you enable pop-ups that are useful windows as opposed to unwanted ads. One feature of Firefox that's vital to some users is that it is a cross-platform application. That means that Firefox works under several different operating systems, not just Windows.
  • 4. Firefox Security Firefox simply handles security differently from Internet Explorer. Where Internet Explorer uses security zones, which can sometimes be confused by malicious software, Firefox does not rely on zones. Also, Firefox doesn't use digital signatures. If you try to install software on your computer, Internet Explorer checks to see if the digital signature matches the actual vendor of the program.
  • 5. ActiveX controls present another security issue. ActiveX is built into Internet Explorer and allows certain Web sites to automatically download scripts or execute small applications. While the absence of ActiveX in Firefox does mean that some sites will not be viewable, it also closes many security holes; in this case, Firefox chooses security over functionality.
  • 6. Another aspect of Firefox versus Internet Explorer security is the fact that Firefox is an open source program. This means that anyone can access the code in which the program is written. That might sound like a bad idea, because you're giving potential hackers access to the code; but in fact, the opposite is true. There are far more people who want to close security holes than there are hackers who want to exploit them. Having thousands of people looking over your code and helping to spot problems means that most security flaws will get fixed very quickly.