ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Web BrowersEtelberto cepeda
Development model: Proprietary                 Software;?Shared SourceThe lost version 9.014 of march of  2011; ago 23 days.Gender: Navigator web, Aggregator?sources, Client FTPOperative system: Microsoft WindowsLicense: Freeware?/ Microsoft CLUF (EULA)Idioms: 40?Versions:1?¡¤?2?¡¤?3?¡¤?4?¡¤?5?¡¤?6?¡¤?7?¡¤?8?¡¤?9Internet Explorer
Internet Explorer uses a zone-based?security?framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions.Internet Explorer 6 SP2 onwards uses the?Attachment Execution Service?of?Microsoft Windows?to mark executable files downloaded from the Internet as being potentially unsafe. Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing accidental installation of malware.Internet Explorer 7 introduced the phishing filter, that restricts access to?phishing?sites unless the user overrides the decision. With version 8, it also blocks access to sites known to host?malware. Downloads are also checked to see if they are known to be malware-infected.In?Windows Vista, Internet Explorer by default runs in what is called?Protected Mode, where the privileges of the browser itself are severely restricted¡ªit cannot make any system-wide changes. One can optionally turn this mode off but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited.Security
Original author: Mozilla CorporationDeveloper: Mozilla Corporation, Mozilla FoundationInitial: release November 9, 2004Stable release: 4.0??(March 22, 2011; 16 days ago)?Vesions: Versi¨®n 1.5,Versi¨®n 2.0,Versi¨®n 3.0,Versi¨®n 3.5,Versi¨®n 3.6,Versi¨®n 4.0Written in C/C++,?JavaScript,?CSS,?XUL, XBL Operating system Cross-platformEngine GeckoSize       19?MB?¨C Windows19?MB ¨C Mac OS X10?MB ¨C GNU/Linux49?MB ¨C source codeAvailable in 86 languagesDevelopment status: Active Type: Web browser, FTP client and Gopher clientLicense: Since version 3.0.6:?MPL,?GNU GPL or?GNU LGPL,?version 3.0.5 and Earlier executable code version Mozilla Firefox?EULA?1.0/1.1,version 3.0.5 and Earlier source code version of certain Firefox functionality: MPLMozilla fiferox
Firefox uses a safety system sandbox.69 There uses the system SSL/TLS to protect the communication with the web servants, using strong cryptography when there is in use the protocol HttpsIt possesses a protection antiphishing, antimalware and integration the antivirus.                      security
Developer: Google Inc.Initial release: September 2, 2008; 2 years ago Stable release: 10.0.648.204??(March 24, 2011; 14 days ago)?Preview release 11.0.696.34 (Beta)??(April 4, 2011; 3 days ago) 12.0.725.0 (Dev)??(April 5, 2011; 2 days ago)Written in C++,?Assembly,?Python,?JavaScript. Operating system: Linux, Mac OS X?(10.5 and later, Intel only)Windows?(XP SP2?and later). Engine: WebKit?(based on?KHTML)Available in 50 languagesDevelopment status: ActiveType: Web browser License: Google Chrome Terms of Service; WebKit:?BSD/LGPL;V8: BSDGoogle chrome
SecurityTypically,?plugins?such as?Adobe Flash Player?are not standardized and as such, cannot be sandboxed as tabs can be. These often must run at, or above, the security level of the browser itself. To reduce exposure to attack, plugins are run in separate processes that communicate with the renderer, itself operating at "very low privileges" in dedicated per-tab processes. Plugins will need to be modified to operate within this?software architecture?while following the?principle of least privilege.Chrome supports the?Netscape Plugin Application Programming Interface?(NPAPI),?but does not support the embedding of?ActiveX?controls.A?private browsing?feature called?Incognito?mode is provided that prevents the browser from storing any?history?information or?cookies?from the websites visited.SpeedThe?JavaScript?virtual machine?used by Chrome, the?V8 JavaScript engine, has features such as?dynamic code generation,?hidden class transitions, and?precise garbage collection. Tests by Google in September 2008 showed that V8 was about twice as fast as?Firefox 3.0?and the WebKitnightliesTwo weeks after Chrome's launch, the WebKit team announced a new JavaScript engine,?Squirrel Fish Extreme,?citing a 36% speed improvement over Chrome's V8 engine.Chrome uses?DNS?prefetching to speed up website lookups, as do Firefox?and Safari.This feature is available in Internet Explorer as an extension, and in?Opera?as a User Script.Chrome utilizes the faster?SPDY?protocol designed to replace?HTTP?when communicating with Google services, such as?Google Search,?Gmail, Chrome sync and when serving Google's ads. Google acknowledges that the use of SPDY is enabled in the communication between Chrome and Google's?SSL-enabled servers.
Developer: Apple Inc.Initial release January 7, 2003Stable release 5.0.4??(March 9, 2011; 28 days ago)?Preview release 5.1??(February 24, 2011; 41 days ago)?[Written in C++,?Objective-COperating system: Mac OS X Leopard, Mac OS X Snow Leopard, Windows XP, Windows Vista, Windows 7 and iOSEngine: WebKit?(Based on?KHTML)Development status: ActiveType: Web browser License: Proprietary; some components?GNU LGPLVersions: ?Safari 1,?Safari 2, ?Safari 3,  Safari 4,?Safari 5              Safari"WebKit2 is designed from the ground up to support a split process model, where the Web content (JavaScript, HTML, layout, etc) lives in a separate process," wrote Apple developer Anders Carlsson to WebKit's public mailing list on April 8, 2010. "This model is similar to what Google Chrome offers, with the major difference being that we have built the process split model directly into the framework, allowing other clients to use it.
           Opera
Opera has several security features visible to the end user. One is the option to delete private data, such as HTTP cookies, the browsing history, and the cache, with the click of a button. This lets users erase personal data after browsing from a shared computer.When visiting a secure web site, Opera encrypts data using either SSL?3 or TLS, both of which are highly secure encryption protocols. It then adds information about the site's security to the address bar. It will also check the web site that is being visited against blacklists for phishing and malware, and warn if it matches any of these lists. This behavior is enabled by default, but the user may opt to not make such checks automatically. If this check is disabled, the user can still check sites individually by opening a Page Info dialog.[
Maxthon
Avant
AppearanceFully skinnable: Range of bundled skin options (21 total)Accessory application allows user to create own skinsHighly customizable: Toolbars can be rearranged freelyMost functions may be accessed from either toolbar buttons or menusAll Buttons and menus are optionalSecurity and privacyPush-button quick blocking of unwanted items (Popups, Adverts, ActiveX, Java, Scripts, Flash, Video, Sound, Images)Customizable black/white lists for popups and ad serversMultiple proxy servers may be configuredBrowsing tracks cleaner - can clear traces automaticallyXP Service Pack 2 security extensions can be integrated
         Camino
Flash Designed Skin Web Browser with all the latest protection shields: Anti Phishing PopUp Killer and CleanUp tools with extended options, Integrated Advanced Search Tool Bar and Tabbed web windows with Floating Preview on mouse over, SideBar History and Favorites extended tools, Skin Database for swapping interface Layout, Full Screen Real Mode with Controller for maximum area display, great for on-line gamers, Integrated Search Bar in the front panel, Automatic search function on page not found (404 error), AutoUpgrade settings, Tabs Floating Preview with display of the Loading Progress. Version 5.3 improvements: Option for selecting a Futuristic default Default Skin and an Easy to use Windows XP classic environment skin, overall Speed Improvements, Better Compatibility, various bugs fixes.Phaseout
Seamonkey
 n        Netsurf
Deepnet Explorer is a web browser created by Deepnet Security for the Microsoft Windows platform. The most recent version is 1.5.3 (BETA 3) which was Released October 19, 2006. Developed in Britain, Deepnet Explorer gained early recognition both for its use of anti-phishing tools and the inclusion of a peer-to-peer facility for file sharing, based on the Gnutella network. The anti-phishing feature, in combination with other additions, led the developers to claim that it had a higher level of security than either Firefox or Internet Explorer¡ªhowever, as the underlying rendering engine was still the same as that employed in Internet Explorer, it was suggested that the improved security would fail to address the vulnerabilities found in the rendering engine.Deepnet

More Related Content

What's hot (18)

Web browser by group no 03 capt palliyaguru
Web browser by group no 03   capt palliyaguruWeb browser by group no 03   capt palliyaguru
Web browser by group no 03 capt palliyaguru
praeeth palliyaguru
?
Web browser
Web browserWeb browser
Web browser
Hardik Kakadiya
?
India's First Web browser
India's First Web browserIndia's First Web browser
India's First Web browser
ranjith007
?
internet explorer
internet explorerinternet explorer
internet explorer
nisma shaikh
?
Web Browser
Web BrowserWeb Browser
Web Browser
Shreeram Goswami
?
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
Aahmed Hussain
?
Web browser
Web browserWeb browser
Web browser
Abhijeet Shah
?
Research on Web Browsers ppt
Research on Web Browsers pptResearch on Web Browsers ppt
Research on Web Browsers ppt
Sagar Agarwal
?
SHASHANK PPT BASED ON Web browsers
SHASHANK PPT BASED ON Web browsersSHASHANK PPT BASED ON Web browsers
SHASHANK PPT BASED ON Web browsers
shashank55578
?
Browsers
BrowsersBrowsers
Browsers
valentinabehaine
?
Browsers
BrowsersBrowsers
Browsers
danielmantillab
?
Evolution of web browsers ppt
Evolution of web browsers pptEvolution of web browsers ppt
Evolution of web browsers ppt
Jyothi Reddy
?
Browsers
BrowsersBrowsers
Browsers
Abraham Sierra
?
Tutorial 1 - Browser Basics
Tutorial 1 - Browser BasicsTutorial 1 - Browser Basics
Tutorial 1 - Browser Basics
dpd
?
Browsers
BrowsersBrowsers
Browsers
ADLEG
?
Research on Web Browsers
Research on Web BrowsersResearch on Web Browsers
Research on Web Browsers
Sagar Agarwal
?
Web browsers
Web browsersWeb browsers
Web browsers
camilobuelvasr
?
Web browsers
Web browsersWeb browsers
Web browsers
carlos19995
?

Similar to Web browsertico (20)

Web browsers
Web browsersWeb browsers
Web browsers
carlos19995
?
Trabajo de jose
Trabajo de jose Trabajo de jose
Trabajo de jose
josemgg
?
Browsers
BrowsersBrowsers
Browsers
Sebastian Lora
?
Browsers
BrowsersBrowsers
Browsers
Sebastian Lora
?
Browsers
BrowsersBrowsers
Browsers
Sebastian Lora
?
Browsers .
Browsers .Browsers .
Browsers .
seripa3
?
Internet browsers by Andres Haydar
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres Haydar
AndresHaydar
?
Browsers
BrowsersBrowsers
Browsers
Laura Rubio
?
Browsers
BrowsersBrowsers
Browsers
Laura Rubio
?
Browsers
BrowsersBrowsers
Browsers
mariabeatrizp
?
Browsers
BrowsersBrowsers
Browsers
mariabeatrizp
?
Browsers
BrowsersBrowsers
Browsers
mariabeatrizp
?
Browsers
BrowsersBrowsers
Browsers
mariabeatrizp
?
Browsers
BrowsersBrowsers
Browsers
mariabeatrizp
?
Web browsers
Web browsersWeb browsers
Web browsers
Jorge Enrrique Vergara Salgado
?
Browsers
BrowsersBrowsers
Browsers
ADLEG
?
Web browsers
Web browsersWeb browsers
Web browsers
Nathalia Sanchez
?
Browsers
BrowsersBrowsers
Browsers
Abraham Sierra
?
Surfing of the internet
Surfing of the internetSurfing of the internet
Surfing of the internet
Maria Camila Garcia
?
Surfing of the internet
Surfing of the internetSurfing of the internet
Surfing of the internet
Maria Camila Garcia
?

Recently uploaded (20)

DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB
?
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
?
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & TipsTrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc
?
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
?
AIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramento
AIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramentoAIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramento
AIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramento
Alessandro Bogliolo
?
Both Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial IntelligenceBoth Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial Intelligence
Pete Nieminen
?
Endpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore ItEndpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore It
MSP360
?
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs
?
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
?
The Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nesThe Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nes
ScyllaDB
?
Gojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptxGojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptx
V3cube
?
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarterQ4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
MariaBarbaraPaglinaw
?
Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)
nick896721
?
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Jonathan Bowen
?
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
?
Fl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free DownloadFl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free Download
kherorpacca127
?
A Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin EngineeringA Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin Engineering
Daniel Lehner
?
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial PresentationMIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND CTI
?
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
?
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB
?
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
?
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & TipsTrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc
?
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
?
AIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramento
AIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramentoAIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramento
AIXMOOC 2.3 - Modelli di reti neurali con esperimenti di addestramento
Alessandro Bogliolo
?
Both Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial IntelligenceBoth Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial Intelligence
Pete Nieminen
?
Endpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore ItEndpoint Backup: 3 Reasons MSPs Ignore It
Endpoint Backup: 3 Reasons MSPs Ignore It
MSP360
?
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs
?
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
?
The Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nesThe Future of Repair: Transparent and Incremental by Botond De?nes
The Future of Repair: Transparent and Incremental by Botond De?nes
ScyllaDB
?
Gojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptxGojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptx
V3cube
?
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarterQ4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
Q4_TLE-7-Lesson-6-Week-6.pptx 4th quarter
MariaBarbaraPaglinaw
?
Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)Early Adopter's Guide to AI Moderation (Preview)
Early Adopter's Guide to AI Moderation (Preview)
nick896721
?
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Formal Methods: Whence and Whither? [Martin Fr?nzle Festkolloquium, 2025]
Jonathan Bowen
?
Unlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & KeylockUnlocking DevOps Secuirty :Vault & Keylock
Unlocking DevOps Secuirty :Vault & Keylock
HusseinMalikMammadli
?
Fl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free DownloadFl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free Download
kherorpacca127
?
A Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin EngineeringA Framework for Model-Driven Digital Twin Engineering
A Framework for Model-Driven Digital Twin Engineering
Daniel Lehner
?
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial PresentationMIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND Revenue Release Quarter 4 2024 - Finacial Presentation
MIND CTI
?
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptxUnderstanding Traditional AI with Custom Vision & MuleSoft.pptx
Understanding Traditional AI with Custom Vision & MuleSoft.pptx
shyamraj55
?

Web browsertico

  • 2. Development model: Proprietary Software;?Shared SourceThe lost version 9.014 of march of 2011; ago 23 days.Gender: Navigator web, Aggregator?sources, Client FTPOperative system: Microsoft WindowsLicense: Freeware?/ Microsoft CLUF (EULA)Idioms: 40?Versions:1?¡¤?2?¡¤?3?¡¤?4?¡¤?5?¡¤?6?¡¤?7?¡¤?8?¡¤?9Internet Explorer
  • 3. Internet Explorer uses a zone-based?security?framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions.Internet Explorer 6 SP2 onwards uses the?Attachment Execution Service?of?Microsoft Windows?to mark executable files downloaded from the Internet as being potentially unsafe. Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing accidental installation of malware.Internet Explorer 7 introduced the phishing filter, that restricts access to?phishing?sites unless the user overrides the decision. With version 8, it also blocks access to sites known to host?malware. Downloads are also checked to see if they are known to be malware-infected.In?Windows Vista, Internet Explorer by default runs in what is called?Protected Mode, where the privileges of the browser itself are severely restricted¡ªit cannot make any system-wide changes. One can optionally turn this mode off but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited.Security
  • 4. Original author: Mozilla CorporationDeveloper: Mozilla Corporation, Mozilla FoundationInitial: release November 9, 2004Stable release: 4.0??(March 22, 2011; 16 days ago)?Vesions: Versi¨®n 1.5,Versi¨®n 2.0,Versi¨®n 3.0,Versi¨®n 3.5,Versi¨®n 3.6,Versi¨®n 4.0Written in C/C++,?JavaScript,?CSS,?XUL, XBL Operating system Cross-platformEngine GeckoSize 19?MB?¨C Windows19?MB ¨C Mac OS X10?MB ¨C GNU/Linux49?MB ¨C source codeAvailable in 86 languagesDevelopment status: Active Type: Web browser, FTP client and Gopher clientLicense: Since version 3.0.6:?MPL,?GNU GPL or?GNU LGPL,?version 3.0.5 and Earlier executable code version Mozilla Firefox?EULA?1.0/1.1,version 3.0.5 and Earlier source code version of certain Firefox functionality: MPLMozilla fiferox
  • 5. Firefox uses a safety system sandbox.69 There uses the system SSL/TLS to protect the communication with the web servants, using strong cryptography when there is in use the protocol HttpsIt possesses a protection antiphishing, antimalware and integration the antivirus. security
  • 6. Developer: Google Inc.Initial release: September 2, 2008; 2 years ago Stable release: 10.0.648.204??(March 24, 2011; 14 days ago)?Preview release 11.0.696.34 (Beta)??(April 4, 2011; 3 days ago) 12.0.725.0 (Dev)??(April 5, 2011; 2 days ago)Written in C++,?Assembly,?Python,?JavaScript. Operating system: Linux, Mac OS X?(10.5 and later, Intel only)Windows?(XP SP2?and later). Engine: WebKit?(based on?KHTML)Available in 50 languagesDevelopment status: ActiveType: Web browser License: Google Chrome Terms of Service; WebKit:?BSD/LGPL;V8: BSDGoogle chrome
  • 7. SecurityTypically,?plugins?such as?Adobe Flash Player?are not standardized and as such, cannot be sandboxed as tabs can be. These often must run at, or above, the security level of the browser itself. To reduce exposure to attack, plugins are run in separate processes that communicate with the renderer, itself operating at "very low privileges" in dedicated per-tab processes. Plugins will need to be modified to operate within this?software architecture?while following the?principle of least privilege.Chrome supports the?Netscape Plugin Application Programming Interface?(NPAPI),?but does not support the embedding of?ActiveX?controls.A?private browsing?feature called?Incognito?mode is provided that prevents the browser from storing any?history?information or?cookies?from the websites visited.SpeedThe?JavaScript?virtual machine?used by Chrome, the?V8 JavaScript engine, has features such as?dynamic code generation,?hidden class transitions, and?precise garbage collection. Tests by Google in September 2008 showed that V8 was about twice as fast as?Firefox 3.0?and the WebKitnightliesTwo weeks after Chrome's launch, the WebKit team announced a new JavaScript engine,?Squirrel Fish Extreme,?citing a 36% speed improvement over Chrome's V8 engine.Chrome uses?DNS?prefetching to speed up website lookups, as do Firefox?and Safari.This feature is available in Internet Explorer as an extension, and in?Opera?as a User Script.Chrome utilizes the faster?SPDY?protocol designed to replace?HTTP?when communicating with Google services, such as?Google Search,?Gmail, Chrome sync and when serving Google's ads. Google acknowledges that the use of SPDY is enabled in the communication between Chrome and Google's?SSL-enabled servers.
  • 8. Developer: Apple Inc.Initial release January 7, 2003Stable release 5.0.4??(March 9, 2011; 28 days ago)?Preview release 5.1??(February 24, 2011; 41 days ago)?[Written in C++,?Objective-COperating system: Mac OS X Leopard, Mac OS X Snow Leopard, Windows XP, Windows Vista, Windows 7 and iOSEngine: WebKit?(Based on?KHTML)Development status: ActiveType: Web browser License: Proprietary; some components?GNU LGPLVersions: ?Safari 1,?Safari 2, ?Safari 3, Safari 4,?Safari 5 Safari"WebKit2 is designed from the ground up to support a split process model, where the Web content (JavaScript, HTML, layout, etc) lives in a separate process," wrote Apple developer Anders Carlsson to WebKit's public mailing list on April 8, 2010. "This model is similar to what Google Chrome offers, with the major difference being that we have built the process split model directly into the framework, allowing other clients to use it.
  • 9. Opera
  • 10. Opera has several security features visible to the end user. One is the option to delete private data, such as HTTP cookies, the browsing history, and the cache, with the click of a button. This lets users erase personal data after browsing from a shared computer.When visiting a secure web site, Opera encrypts data using either SSL?3 or TLS, both of which are highly secure encryption protocols. It then adds information about the site's security to the address bar. It will also check the web site that is being visited against blacklists for phishing and malware, and warn if it matches any of these lists. This behavior is enabled by default, but the user may opt to not make such checks automatically. If this check is disabled, the user can still check sites individually by opening a Page Info dialog.[
  • 12. Avant
  • 13. AppearanceFully skinnable: Range of bundled skin options (21 total)Accessory application allows user to create own skinsHighly customizable: Toolbars can be rearranged freelyMost functions may be accessed from either toolbar buttons or menusAll Buttons and menus are optionalSecurity and privacyPush-button quick blocking of unwanted items (Popups, Adverts, ActiveX, Java, Scripts, Flash, Video, Sound, Images)Customizable black/white lists for popups and ad serversMultiple proxy servers may be configuredBrowsing tracks cleaner - can clear traces automaticallyXP Service Pack 2 security extensions can be integrated
  • 14. Camino
  • 15. Flash Designed Skin Web Browser with all the latest protection shields: Anti Phishing PopUp Killer and CleanUp tools with extended options, Integrated Advanced Search Tool Bar and Tabbed web windows with Floating Preview on mouse over, SideBar History and Favorites extended tools, Skin Database for swapping interface Layout, Full Screen Real Mode with Controller for maximum area display, great for on-line gamers, Integrated Search Bar in the front panel, Automatic search function on page not found (404 error), AutoUpgrade settings, Tabs Floating Preview with display of the Loading Progress. Version 5.3 improvements: Option for selecting a Futuristic default Default Skin and an Easy to use Windows XP classic environment skin, overall Speed Improvements, Better Compatibility, various bugs fixes.Phaseout
  • 17. n Netsurf
  • 18. Deepnet Explorer is a web browser created by Deepnet Security for the Microsoft Windows platform. The most recent version is 1.5.3 (BETA 3) which was Released October 19, 2006. Developed in Britain, Deepnet Explorer gained early recognition both for its use of anti-phishing tools and the inclusion of a peer-to-peer facility for file sharing, based on the Gnutella network. The anti-phishing feature, in combination with other additions, led the developers to claim that it had a higher level of security than either Firefox or Internet Explorer¡ªhowever, as the underlying rendering engine was still the same as that employed in Internet Explorer, it was suggested that the improved security would fail to address the vulnerabilities found in the rendering engine.Deepnet