SlideShare a Scribd company logo
Introduction to How Firefox Works
A Web browser is sort of like the tires on your car.
You don't really give them much daily thought, but
without them, you're not going anywhere. The
second something goes wrong, you definitely
notice. Options are out there, however, and one of
them has been steadily chipping away at Internet
Explorer's dominance. It's called Firefox. From its
origins as an offshoot of the once-popular
Netscape browser, Firefox is building a growing
legion of dedicated users who spread their
enthusiasm by word of mouth .
Firefox History
When Firefox was still in the beta stage (when a
program hasn't been publicly released, but people
can download and use it to help find and fix
problems), it was already generating a healthy
buzz among tech-savvy Web surfers. In just four
months after the official release on Nov. 9, 2004,
an estimated 23 million people downloaded
Firefox. Web tracker OneStat.com reported on
Nov. 22, 2004, that Internet Explorer's share of
Web browser use had dropped five percent since
May of that year. Firefox had a user percentage of
4.5 percent. Current estimates have Firefox's
market share at nearly 20 percent.
Firefox Basics
There is much debate over the security of Web
browsers. Microsoft regularly releases patches
and updates to fix security holes in Internet
Explorer that might allow someone to install
malicious software or steal information from a
computer. Early on, Firefox was considered safer
than IE, but every program has its flaws. In fact,
just five hours after Firefox 3 was released, a
vulnerability was discovered in the browser's
code. Internet Explorer is sitll a bigger target for
hackers because more people use it, but as
Firefox becomes more popular among Web
browsers, that may change.
Firefox Features
Firefox comes with a few useful features that set it
apart from earlier versions of Internet Explorer --
so useful, in fact, that virtually every other
browser, including Internet Explorer, Opera, Safari
and Google Chrome, has also adopted them. One
of the most noticeable is tabbed browsing. If
you're browsing in Internet Explorer 6, and you
want to visit a new Web site while keeping your
current one open, you have to open a completely
new browser window. Firefox solves that by
allowing sites to open in separate tabs within the
same browser window. Instead of switching
between browser windows.
Firefox Extensions
Adblock Plus -- There are several different ad-
blocking extensions available in addition to the
pop-up blocking Firefox has built-in. These
extensions allow users to block some or all
banner ads and other advertisements that appear
on Web pages. Some use a list of known ad
servers or block images from servers with the
words "banner" or "adserver" in the domain name.
Others display ads normally, but if a user finds a
particular ad exceptionally annoying or obtrusive,
he or she can right-click on it and choose to
remove it in the resulting drop-down menu.
Firefox Security
Another aspect of Firefox versus Internet Explorer
security is the fact that Firefox is an open source
program. This means that anyone can access the
code in which the program is written. That might
sound like a bad idea, because you're giving
potential hackers access to the code; but in fact,
the opposite is true. There are far more people
who want to close security holes than there are
hackers who want to exploit them. Having
thousands of people looking over your code and
helping to spot problems means that most security
flaws will get fixed very quickly.

More Related Content

What's hot

Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021
InternetDevels
 
Web Browsers11
Web Browsers11Web Browsers11
Web Browsers11Dyern
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
Datto
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
n|u - The Open Security Community
 
popular windows applications
popular windows applicationspopular windows applications
popular windows applications
Mohsen M. Mirkhan
 
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
achettih
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3vcaaron
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3vcaaron
 
New gen web browsers and search tools
New gen web browsers and search toolsNew gen web browsers and search tools
New gen web browsers and search tools
sushiaaron
 
Web browsers manuel zapata
Web browsers manuel zapataWeb browsers manuel zapata
Web browsers manuel zapataManuel Zapata
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPress
Jeff Hester
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface Applications
Wardell Motley, NSA IAM\IEM
 

What's hot (16)

Sw2
Sw2Sw2
Sw2
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021Website support Internet Explorer and other older browsers in 2021
Website support Internet Explorer and other older browsers in 2021
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Web Browsers11
Web Browsers11Web Browsers11
Web Browsers11
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
popular windows applications
popular windows applicationspopular windows applications
popular windows applications
 
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-OnsAbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
AbusingExploitingAndPWN-ingWithFirefoxAdd-Ons
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3
 
Mozilla Firefox 3
Mozilla Firefox 3Mozilla Firefox 3
Mozilla Firefox 3
 
New gen web browsers and search tools
New gen web browsers and search toolsNew gen web browsers and search tools
New gen web browsers and search tools
 
Web browsers manuel zapata
Web browsers manuel zapataWeb browsers manuel zapata
Web browsers manuel zapata
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPress
 
Conficker
ConfickerConficker
Conficker
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface Applications
 

Similar to 無題 1

Prezen2
Prezen2Prezen2
Prezen2
s1170036
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentationray0510711s
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Workss1170166
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Workss1170024
 
Sw homework week11
Sw homework week11Sw homework week11
Sw homework week11s1200001
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Getting Started with Firefox
Getting Started with FirefoxGetting Started with Firefox
Getting Started with FirefoxAsmaa El-Bamby
 
Week11
Week11Week11
Week11
s1180181
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Worksyuyatamaru
 
Web browers
Web browersWeb browers
Web browers
Rishabh Shrivastava
 
Web browsers
Web       browsersWeb       browsers
Web browsersfedelae
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
carmausve
 

Similar to 無題 1 (20)

Prezen2
Prezen2Prezen2
Prezen2
 
Sp W11
Sp W11Sp W11
Sp W11
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Sw homework week11
Sw homework week11Sw homework week11
Sw homework week11
 
Week11
Week11Week11
Week11
 
Firefox
FirefoxFirefox
Firefox
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Firefox
FirefoxFirefox
Firefox
 
Getting Started with Firefox
Getting Started with FirefoxGetting Started with Firefox
Getting Started with Firefox
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
Week11
Week11Week11
Week11
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Browsers
BrowsersBrowsers
Browsers
 
Web browers
Web browersWeb browers
Web browers
 
Web browsers
Web       browsersWeb       browsers
Web browsers
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 

More from s1170034 (20)

Stage6
Stage6Stage6
Stage6
 
Stage6
Stage6Stage6
Stage6
 
Stage5
Stage5Stage5
Stage5
 
英語2
英語2英語2
英語2
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
Plesen[2]
Plesen[2]Plesen[2]
Plesen[2]
 
英語3
英語3英語3
英語3
 
英語3
英語3英語3
英語3
 
英語2
英語2英語2
英語2
 
Week4
Week4Week4
Week4
 
Week4
Week4Week4
Week4
 
英語
英語英語
英語
 
英語
英語英語
英語
 
7
77
7
 
7
77
7
 
7
77
7
 
4
44
4
 
9
99
9
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

無題 1

  • 1. Introduction to How Firefox Works A Web browser is sort of like the tires on your car. You don't really give them much daily thought, but without them, you're not going anywhere. The second something goes wrong, you definitely notice. Options are out there, however, and one of them has been steadily chipping away at Internet Explorer's dominance. It's called Firefox. From its origins as an offshoot of the once-popular Netscape browser, Firefox is building a growing legion of dedicated users who spread their enthusiasm by word of mouth .
  • 2. Firefox History When Firefox was still in the beta stage (when a program hasn't been publicly released, but people can download and use it to help find and fix problems), it was already generating a healthy buzz among tech-savvy Web surfers. In just four months after the official release on Nov. 9, 2004, an estimated 23 million people downloaded Firefox. Web tracker OneStat.com reported on Nov. 22, 2004, that Internet Explorer's share of Web browser use had dropped five percent since May of that year. Firefox had a user percentage of 4.5 percent. Current estimates have Firefox's market share at nearly 20 percent.
  • 3. Firefox Basics There is much debate over the security of Web browsers. Microsoft regularly releases patches and updates to fix security holes in Internet Explorer that might allow someone to install malicious software or steal information from a computer. Early on, Firefox was considered safer than IE, but every program has its flaws. In fact, just five hours after Firefox 3 was released, a vulnerability was discovered in the browser's code. Internet Explorer is sitll a bigger target for hackers because more people use it, but as Firefox becomes more popular among Web browsers, that may change.
  • 4. Firefox Features Firefox comes with a few useful features that set it apart from earlier versions of Internet Explorer -- so useful, in fact, that virtually every other browser, including Internet Explorer, Opera, Safari and Google Chrome, has also adopted them. One of the most noticeable is tabbed browsing. If you're browsing in Internet Explorer 6, and you want to visit a new Web site while keeping your current one open, you have to open a completely new browser window. Firefox solves that by allowing sites to open in separate tabs within the same browser window. Instead of switching between browser windows.
  • 5. Firefox Extensions Adblock Plus -- There are several different ad- blocking extensions available in addition to the pop-up blocking Firefox has built-in. These extensions allow users to block some or all banner ads and other advertisements that appear on Web pages. Some use a list of known ad servers or block images from servers with the words "banner" or "adserver" in the domain name. Others display ads normally, but if a user finds a particular ad exceptionally annoying or obtrusive, he or she can right-click on it and choose to remove it in the resulting drop-down menu.
  • 6. Firefox Security Another aspect of Firefox versus Internet Explorer security is the fact that Firefox is an open source program. This means that anyone can access the code in which the program is written. That might sound like a bad idea, because you're giving potential hackers access to the code; but in fact, the opposite is true. There are far more people who want to close security holes than there are hackers who want to exploit them. Having thousands of people looking over your code and helping to spot problems means that most security flaws will get fixed very quickly.