US-CERT Cyber Security Tip ST04-022 -- Understanding Your Computer: Web Browsers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                        Cyber Security Tip ST04-022
                 Understanding Your Computer: Web Browsers

   Web browsers allow you to navigate the internet. There are a variety of
   options available, so you can choose the one that best suits your needs.

How do web browsers work?

   A  web browser is an application that finds and displays web pages. It
   coordinates communication between your computer and the web server where a
   particular website "lives."

   When you open your browser and type in a web address (URL) for a website,
   the browser submits a request to the server, or servers, that provide the
   content for that page. The browser then processes the code from the server
   (written in a language such as HTML, JavaScript, or XML) and loads any other
   elements (such as Flash, Java, or ActiveX) that are necessary to generate
   content for the page. After the browser has gathered and processed all of
   the components, it displays the complete, formatted web page. Every time you
   perform an action on the page, such as clicking buttons and following links,
   the browser continues the process of requesting, processing, and presenting
   content.

How many browsers are there?

   There are many different browsers. Most users are familiar with graphical
   browsers,  which  display  both text and graphics and may also display
   multimedia elements such as sound or video clips. However, there are also
   text-based browsers. The following are some well-known browsers:
     * Internet Explorer
     * Firefox
     * AOL
     * Opera
     * Safari - a browser specifically designed for Macintosh computers
     * Lynx - a text-based browser desirable for vision-impaired users because
       of the availability of special devices that read the text

How do you choose a browser?

   A  browser is usually included with the installation of your operating
   system, but you are not restricted to that choice. Some of the factors to
   consider when deciding which browser best suits your needs include
     * compatibility - Does the browser work with your operating system?
     * security  -  Do you feel that your browser offers you the level of
       security you want?
     * ease of use - Are the menus and options easy to understand and use?
     * functionality - Does the browser interpret web content correctly? If you
       need to install other plug-ins or devices to translate certain types of
       content, do they work?
     * appeal - Do you find the interface and way the browser interprets web
       content visually appealing?

Can you have more than one browser installed at the same time?

   If you decide to change your browser or add another one, you don't have to
   uninstall the browser that's currently on your computerâ??you can have more
   than one browser on your computer at once. However, you will be prompted to
   choose one as your default browser. Anytime you follow a link in an email
   message or document, or you double-click a shortcut to a web page on your
   desktop, the page will open using your default browser. You can manually
   open the page in another browser.

   Most vendors give you the option to download their browsers directly from
   their websites. Make sure to verify the authenticity of the site before
   downloading any files. To further minimize risk, follow other good security
   practices, like using a firewall and keeping anti-virus software up to date
   (see Understanding Firewalls, Understanding Anti-Virus Software, and other
   US-CERT Cyber Security Tips for more information).
   _________________________________________________________________

   Author: Mindi McDowell
   _________________________________________________________________

   Produced 2004 by US-CERT, a government organization.

   Note: This tip was previously published and is being re-distributed to increase awareness.

   Terms of use

   http://www.us-cert.gov/legal.html

   This document can also be found at

   http://www.us-cert.gov/cas/tips/ST04-022.html

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit http://www.us-cert.gov/cas/signup.html.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBS4bpPC/E9ke+6HGsAQLNlAf/XHDGwWonBRoKgAR1MWSxjHfcYJpATtOr
PjwgFjIX8cORwimQdZtR2o6cmiZAUnxII92uYTNMxLX9JF/kddw5yjtLFPoEgK0r
A3MhgFE4Hn/JcmD4GU8rxCl9LP8zH563bWVe0oGPrzJxzxF5HfaYtrhn6YXEC0/E
mVw+wLqz3fXZ/jiKlyCtvC6ickQZ5BMZbQ8lzUtq6nuGphYGfoZj3nw+KEWfXHYS
UkJE3tZuHX6xdDfCPwPyLg3N8gL3cWGd0/BbfbzCm5HK7izspiduJgb0yV5a32A3
HNQvPLtWGXnfnRJTgOhcMXI+g6/LUoK1+9RNu9nS8R5Uf/+81prRAA==
=GcS5
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux