SlideShare a Scribd company logo
1 of 6
Download to read offline
Introduction to How Firefox Works
A Web browser is sort of like the tires on your car.
You don't really give them much daily thought, but
without them, you're not going anywhere. The
second something goes wrong, you definitely
notice. Options are out there, however, and one of
them has been steadily chipping away at Internet
Explorer's dominance. It's called Firefox. From its
origins as an offshoot of the once-popular
Netscape browser, Firefox is building a growing
legion of dedicated users who spread their
enthusiasm by word of mouth .
Firefox History
When Firefox was still in the beta stage (when a
program hasn't been publicly released, but people
can download and use it to help find and fix
problems), it was already generating a healthy
buzz among tech-savvy Web surfers. In just four
months after the official release on Nov. 9, 2004,
an estimated 23 million people downloaded
Firefox. Web tracker OneStat.com reported on
Nov. 22, 2004, that Internet Explorer's share of
Web browser use had dropped five percent since
May of that year. Firefox had a user percentage of
4.5 percent. Current estimates have Firefox's
market share at nearly 20 percent.
Firefox Basics
There is much debate over the security of Web
browsers. Microsoft regularly releases patches
and updates to fix security holes in Internet
Explorer that might allow someone to install
malicious software or steal information from a
computer. Early on, Firefox was considered safer
than IE, but every program has its flaws. In fact,
just five hours after Firefox 3 was released, a
vulnerability was discovered in the browser's
code. Internet Explorer is sitll a bigger target for
hackers because more people use it, but as
Firefox becomes more popular among Web
browsers, that may change.
Firefox Features
Firefox comes with a few useful features that set it
apart from earlier versions of Internet Explorer --
so useful, in fact, that virtually every other
browser, including Internet Explorer, Opera, Safari
and Google Chrome, has also adopted them. One
of the most noticeable is tabbed browsing. If
you're browsing in Internet Explorer 6, and you
want to visit a new Web site while keeping your
current one open, you have to open a completely
new browser window. Firefox solves that by
allowing sites to open in separate tabs within the
same browser window. Instead of switching
between browser windows.
Firefox Extensions
Adblock Plus -- There are several different ad-
blocking extensions available in addition to the
pop-up blocking Firefox has built-in. These
extensions allow users to block some or all
banner ads and other advertisements that appear
on Web pages. Some use a list of known ad
servers or block images from servers with the
words "banner" or "adserver" in the domain name.
Others display ads normally, but if a user finds a
particular ad exceptionally annoying or obtrusive,
he or she can right-click on it and choose to
remove it in the resulting drop-down menu.
Firefox Security
Another aspect of Firefox versus Internet Explorer
security is the fact that Firefox is an open source
program. This means that anyone can access the
code in which the program is written. That might
sound like a bad idea, because you're giving
potential hackers access to the code; but in fact,
the opposite is true. There are far more people
who want to close security holes than there are
hackers who want to exploit them. Having
thousands of people looking over your code and
helping to spot problems means that most security
flaws will get fixed very quickly.

More Related Content

What's hot

Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021InternetDevels
 
Web Browsers11
Web Browsers11Web Browsers11
Web Browsers11Dyern
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 
popular windows applications
popular windows applicationspopular windows applications
popular windows applicationsMohsen M. Mirkhan
 
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Onsachettih
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3vcaaron
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3vcaaron
 
New gen web browsers and search tools
New gen web browsers and search toolsNew gen web browsers and search tools
New gen web browsers and search toolssushiaaron
 
Web browsers manuel zapata
Web browsers manuel zapataWeb browsers manuel zapata
Web browsers manuel zapataManuel Zapata
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPressJeff Hester
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsWardell Motley, NSA IAM\IEM
 

What's hot (16)

Sw2
Sw2Sw2
Sw2
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Web Browsers11
Web Browsers11Web Browsers11
Web Browsers11
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
popular windows applications
popular windows applicationspopular windows applications
popular windows applications
 
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3
 
New gen web browsers and search tools
New gen web browsers and search toolsNew gen web browsers and search tools
New gen web browsers and search tools
 
Web browsers manuel zapata
Web browsers manuel zapataWeb browsers manuel zapata
Web browsers manuel zapata
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPress
 
Conficker
ConfickerConficker
Conficker
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface Applications
 

Similar to 無題 1

Similar to 無題 1 (20)

Prezen2
Prezen2Prezen2
Prezen2
 
Sp W11
Sp W11Sp W11
Sp W11
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Sw homework week11
Sw homework week11Sw homework week11
Sw homework week11
 
Week11
Week11Week11
Week11
 
Firefox
FirefoxFirefox
Firefox
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Firefox
FirefoxFirefox
Firefox
 
Getting Started with Firefox
Getting Started with FirefoxGetting Started with Firefox
Getting Started with Firefox
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
Week11
Week11Week11
Week11
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Browsers
BrowsersBrowsers
Browsers
 
Web browers
Web browersWeb browers
Web browers
 
Web browsers
Web       browsersWeb       browsers
Web browsers
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 

More from s1170034 (20)

Stage6
Stage6Stage6
Stage6
 
Stage6
Stage6Stage6
Stage6
 
Stage5
Stage5Stage5
Stage5
 
英語2
英語2英語2
英語2
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
英語3
英語3英語3
英語3
 
英語3
英語3英語3
英語3
 
英語2
英語2英語2
英語2
 
Week4
Week4Week4
Week4
 
Week4
Week4Week4
Week4
 
英語
英語英語
英語
 
英語
英語英語
英語
 
7
77
7
 
7
77
7
 
7
77
7
 
4
44
4
 
9
99
9
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

無題 1

  • 1. Introduction to How Firefox Works A Web browser is sort of like the tires on your car. You don't really give them much daily thought, but without them, you're not going anywhere. The second something goes wrong, you definitely notice. Options are out there, however, and one of them has been steadily chipping away at Internet Explorer's dominance. It's called Firefox. From its origins as an offshoot of the once-popular Netscape browser, Firefox is building a growing legion of dedicated users who spread their enthusiasm by word of mouth .
  • 2. Firefox History When Firefox was still in the beta stage (when a program hasn't been publicly released, but people can download and use it to help find and fix problems), it was already generating a healthy buzz among tech-savvy Web surfers. In just four months after the official release on Nov. 9, 2004, an estimated 23 million people downloaded Firefox. Web tracker OneStat.com reported on Nov. 22, 2004, that Internet Explorer's share of Web browser use had dropped five percent since May of that year. Firefox had a user percentage of 4.5 percent. Current estimates have Firefox's market share at nearly 20 percent.
  • 3. Firefox Basics There is much debate over the security of Web browsers. Microsoft regularly releases patches and updates to fix security holes in Internet Explorer that might allow someone to install malicious software or steal information from a computer. Early on, Firefox was considered safer than IE, but every program has its flaws. In fact, just five hours after Firefox 3 was released, a vulnerability was discovered in the browser's code. Internet Explorer is sitll a bigger target for hackers because more people use it, but as Firefox becomes more popular among Web browsers, that may change.
  • 4. Firefox Features Firefox comes with a few useful features that set it apart from earlier versions of Internet Explorer -- so useful, in fact, that virtually every other browser, including Internet Explorer, Opera, Safari and Google Chrome, has also adopted them. One of the most noticeable is tabbed browsing. If you're browsing in Internet Explorer 6, and you want to visit a new Web site while keeping your current one open, you have to open a completely new browser window. Firefox solves that by allowing sites to open in separate tabs within the same browser window. Instead of switching between browser windows.
  • 5. Firefox Extensions Adblock Plus -- There are several different ad- blocking extensions available in addition to the pop-up blocking Firefox has built-in. These extensions allow users to block some or all banner ads and other advertisements that appear on Web pages. Some use a list of known ad servers or block images from servers with the words "banner" or "adserver" in the domain name. Others display ads normally, but if a user finds a particular ad exceptionally annoying or obtrusive, he or she can right-click on it and choose to remove it in the resulting drop-down menu.
  • 6. Firefox Security Another aspect of Firefox versus Internet Explorer security is the fact that Firefox is an open source program. This means that anyone can access the code in which the program is written. That might sound like a bad idea, because you're giving potential hackers access to the code; but in fact, the opposite is true. There are far more people who want to close security holes than there are hackers who want to exploit them. Having thousands of people looking over your code and helping to spot problems means that most security flaws will get fixed very quickly.