Here are my notes on internet browsers. Let me know what you find helpful or missing.
Thank you for not using Internet Explorer. You are using a downlevel browser.
This article says that IE 11 is faster on various tablets.
There is a Touch version of IE 11 for tablets.
Apple discontinued their Windows browser as of 6/14/2013. The last Windows version (5.1.7) is available from Cnet.com/Download.com here.
When you click the Explorer application icon or from Program Files, an additional "IEXPLORE.EXE" process is created. This takes up more memory. Do this if you need another session, as if you are another user.
However, when you pull down File > New > Window, you create another Task for the same process and session.
Normally, only one version of IE can be installed on a Windows machine. However, standalone IE programs are available in zip files from Skyzyx.
Microsoft states in its support Article ID 298618 that Internet Explorer 7 does not support the download of files over 2 GB in size via HTTP.
The first line of a HTML document is specified by ISO 8879. XHTML 1.1 is more recent than HTML 4.01.
From a full list with discussion here.
XHTML 1.1 should begine with:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
XHTML Strict should begine with:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
XHTML with Framesets should begin with:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Frameset//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-frameset.dtd">
HTML 4.01 Transitional with Framesets should begin with:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
HTML Transitional from v3 should begine with:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
HTML 4.01 Strict should begine with:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
XHTML Transitional should begine with:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
Beginning XLST 2.0: From Novice to Professional, by Jeni Tennison (Apress, 2005, ISBN 1590593243).
Beginning XML with DOM and Ajax: From Novice to Professional, by Sas Jacobs (Apress, 2006, ISBN 1590596765).
Internet browsers for PocketPC:
Internet browsers for Apple Macintosh only:
Internet browsers for Linux only:
For $25/year, Proxify allows additional settings to hide your IP address so you can access websites from behind overly restrictive corporate firewalls.
There is, at least in the U.S., a TV ad for Microsoft's Internet Explorer 4.0 package which uses the musical theme from Mozart's Requiem.
“Where do you want to go today?” is the cheery line on the screen.
Meanwhile, the chorus sings in Latin “Confutatis maledictis, flammis acribus addictis," which translates to “The damned and accursed are convicted to flames of hell.”
Counter Exploitation (cexx.org) thoroughly investigates adware, spyware, foistware, etc.
that slows you down, crashes your computer, corrupts your hard disk, robs your privacy, etc.
Please help them with their fine work.
Spyware: Do You Know Who's Watching You - article from the 2001 CPSR Essay Contest.
Counter Exploitation (cexx.org) thoroughly investigates adware, spyware, foistware, etc. that slows you down, crashes your computer, corrupts your hard disk, robs your privacy, etc. Please help them with their fine work.
Spyware: Do You Know Who's Watching You - article from the 2001 CPSR Essay Contest.
From Mozilla.org''s Cross-Platform Front-End (XPFE) project emerged XUL (pronounced like "cool"), now called the XPToolkit project to make lightweight cross-platform cross-device user interfaces as easy to customize as Web pages.
The new Netscape/Mozilla browser were constructed out of the XUL language.
This enabled new features, such as downloadable chrome -- themes users can download to decorate the look and feel of their browser.
Gecko, the layout rendering engine embedded in Mozilla, parses XUL to create the user interface on the fly.
The namespace http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul.
XUL uses event-driven Cascading Style Sheets (CSS) (not looping statements and conditional operations of XSL) to describe the "style" and behavior of XUL user interfaces.
The XML Binding Language (XBL) uses XML to create reusable composite widgets. XBL adds anonymous content, properties, and implementation methods to XML elements.
The jXUL open source project creates a Java library for translating XUL into Java-based user interfaces.
Essential XUL Programming (New York John Wiley & Sons, Inc. (US), 2001) by Bullard, Vaughn.; Smith, Kevin T.; Daconta, Michael C.
In my Windows 95 computer:
Microsoft Internet Explorer (MSIE)IE's integration with the operating system is a mixed blessing. In your Address bar, in addition to "http:" protocol commands, you can also type in operating system resource and file protocol commands. For example, click on this "res:" command to activate the "About" dialog:
Notice that this executes without the kind of warning you get when you execute the calculator program that comes on all Microsoft machines:
c:/windows/system32/calc.exe on Windows 9x & XP machines
You can also specify files to be open on the Address bar:
file:///C:/Windows/win.ini on Windows 9x & XP machines
You will see a Windows configuration file if you did not change the default file association that defines what program Microsoft invokes when you double-click on files with certain suffixes. By default, .ini files are opened with notepad.exe.
This IE 5.5 and 6.0 browser vulnerability allows others to perform the actions above.
External sites can cause Notepad to pop up using Microsoft's view-source protocol. This opens up the win.ini file on your computer's c: drive:
Richard Smith points out that this is a vulnerability not blocked by pop-up blockers or virus checkers, yet your computer can be disabled when you inadvertantly open a malicious attacker's web page containing many lines of this code, which opens a large file, consuming all available memory.
Among ways to crash your computer using Microsoft's Internet Explorer 6 are these demo pages which will cause your "iexplorer.exe" process to crash:
If the colors of a Web page gives you a migraine, set Navigator to use your own default colors instead by checking the box for "Always use my colors, overriding document." In NN3 the box is under Options/General Preferences/Color. In NN4 the box is under Edit/Preferences/Appearance/Color.
SPACE bar to page down
SPACE+Shift to page up
ALT+SPACE+C to Close,
ALT+SPACE+R to Restore,
Instead of clicking on the Back and Forward buttons, you can give your mouse a rest and use Alt and the Right arrow key to move forward, and Alt and the Left arrow key to move back.
Anti-virus software such as McAfee is not enough. I use a personal firewall - Zone Alarm Pro to block annoying pop-up ads and (more importantly), attempts by robots on the net randoming probing for computers vulnerable for being taken over.
SpywareSpyware, also called adware, is commonly defined as any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications can be bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else.
Alexa Toolbar, Bargain Buddy, Bonzi Buddy, Brilliant Digital, Bullguard Popup Ad, CasinoOnNet, Clip Genie, Common Name, Cydoor, Download Receiver, Downloadware, Eaccelaration, Hotbar, IEPlugin, Internet Washer, MyWay Toolbar, Similar Singles, Srng, VirtualBouncer, WildTangent, nCase, vx2 (Transponder)
Annoying TechniquesAmong the unethical ways in the Spyware Encyclopedia:
Shareware Anti-malwareShareware programs are effective, albeit a little more work to download and install them all, since they each have a different role
Shareware Spybot S&D (Search and Destroy) (SpybotSD.exe) Notices changes to the Windows Registry with its own xSpybotSnD entry. I works alongside
Freeware SpywareBlaster from Javacool Software doesn't scan but prevents the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted pests. Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox. Restrict the actions of potentially dangerous sites in Internet Explorer.
Freeware Ad-aware from Lavasoft in Germany removes Gator.
Shareware SpywareGuard (sgbhp.exe and sgmain.exe) catches spyware re it's executed.
Freeware Hijack This lists key areas of a computer's Startup list in the Windows Registry.
This identifies programs automatically invoked at start-up in Registry key 'HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run'
Cloudmark Anti-Fraud Toolbar browser plug-in (free beta version) blocks sites and IP addresses on their blacklist of known sources of malfeasance (spammers and those operating phising schemes) identified by the 1.3 million Cloudmark SafetyBar users who pay the $40 a year for MS Outlook.
Phishing.net's Clear Search Anti-Phishing. Beware of posers. Memory Watcher, which claims to help you watch your memory, actually installs the Peper Trojan. Hidden in the middle of its disclosure:
Among the commercial for-fee software:
None of these program could detect/clean the IE hijacker which directs all web pages to (spotresults.com, azjmp.com). The pernicious pest reinstalls DSO (Data Shared Objects) after Spybot attempts to delete it. This is because the pest exists in memory The DSOStop2.exe fixes the registry keys for signed and unsigned ActiveX pests.
After boot up in Safe Mode to delete these hidden files:
Winsock2 LSP-Fix to select inetadpt.dll and move all instances of it to the Remove (RHS) side. This is a rogue Layered Service Providers (LSP) inserted into Window's TCP/IP handler to intercept outbound data and divert it elsewhere.
Zone Alarm ConfigurationZone Alarm can be annoying because it does not offer a familiar Windows interface with pull down menus.
When I tried to open an Adobe Acrobat (.pdf) file, I got “Page blocked” instead. But instead of turning off the program entirely to get to a page it blocks (very dangerous), I figured out how to better control the program. I change Zone Alarm configuration temporarily.
In the Privacy tab, click Custom in the Mobile Code Control section. I uncheck “Block mime-type integrated objects”. This is because Adobe acrobat pdf files are a special mime-type.
Opt-out from 3rd-party tracking cookies at the source -- those providing online advertising technologies.
If you receive a timeout error such as the following, it may be the site's server or your brower setting.
Internet Explorer cannot open the Internet site web address.
The operation timed out.
The page cannot be displayed. Cannot find server or DNS Error.
So that you do not wait endlessly for the server to come back with data when the server has a problem, Internet Explorer imposes a time-out limit for the server to return data. (five minutes for versions 4.0 and 4.01)
In Internet Explorer 4.01 Service Pack 1 or later (IE 5, 5.5, 6), you can change the timeout by adding a ReceiveTimeout DWORD value in registry key: HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Internet Settings with a data value of (number of seconds)*1000. To set a 2 minute timeout duration, set the ReceiveTimeout data value to (2*60*1000) = 120000. Restart your computer.
SSL was developed by Netscape Communications Corporation in 1994 to secure transactions over the World Wide Web.
Soon after, the Internet Engineering Task Force (IETF) began work to develop a standard protocol. They used SSL 3.0 as the basis for the TLS 1.0 (Transparent LAN service) protocol defined in their RFC 2246 published Jan. 1999, with extensions updated by RFC 3546 on June 2003.
Clients confirm the validity of a serverís credentials with a trusted root certification authorityís (CAís) certificates loaded on the web server machine. So users don't need to establish accounts before they create a secure connection with a server.
The sender create a one-way hash key from the data. This is sent along with the data.
TLS uses the Message Authentication Code (HMAC) algorithm which is more secure than the SSL Message Authentication Code (MAC) algorithm. So TLS is used by public web sites that need to be highly secure, such as the website to submit Top Secret applicantions
TLS doesn't use Fortezza algorithms because they are proprietary and thus not open for public review.
One advantage of TLS is that it accepts intermediary authority certificates, whereas SSL prompts the user for a certificate all the way back to the root CA.
The biggest disadvantages of using TLS 1.0:
Firefox 3 is worth the extra download/install effot becoming of its speed, and especially extensions:
Download Firefox extensions, which have .xpi file extentions. Mozilla requires developer attention with each new major version. So extensions can die from developer neglect.
If your extension becomes obsolte, version compatibility can be forced using "Nightly Tester Tools" FF-Addon or manaully this way:
See my notes on CSS
Your first name:
Your family name:
Your location (city, country):
Your Email address:
Top of Page