SlideShare a Scribd company logo
browsers By: VALENTINA BEHAINE
Internet Explorer
Internet Explorer is the most widely-used web browser, although since 2004 it began losing usage share to other browsers. The current estimation is about 90 percentage of the total usage.
Internet Explorer 1August 16, 1995. Internet Explorer 2 November 22, 1995. Internet Explorer 3 August 13, 1996. Internet Explorer 4 September 1997. Internet Explorer 5 March 18, 1999. Internet Explorer 6 August 27, 2001. Internet Explorer 7 October 18, 2006. Internet Explorer 8 March 19, 2009. Internet Explorer 9 March 14,2011. 
security Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions. Internet Explorer has been subjected to many security vulnerabilities and concerns: Much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page in order to install themselves.
Usability and accessibility Internet Explorer makes use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to that of Windows Explorer. Pop-up blocking and tabbed browsing were added respectively in Internet Explorer 6 and Internet Explorer 7. Tabbed browsing can also be added to older versions by installing MSN Search Toolbaror Yahoo Toolbar
MozillaFireFox
November 9, 2004 Version 2.0- Version 3.0- Version 3.5- Version 3.6- Version 4.0-Firefox for mobile --Version 5, 6 & 7 (Future developments) size 19 MB– Windows19 MB – Mac OS X10 MB – GNU/Linux49 MB – sourcecode
Security is considered as the browser with the most reliable security. Firefox uses a sandbox security model, and limits scripts from accessing data from other web sites based on the same origin policy. It uses SSL/TLS to protect communications with web servers using strong cryptography when using the HTTPS protocol. It also provides support for web applications to use smartcards for authentication purposes.
September 2, 2008 Google Chrome aims to be secure, fast, simpleand stable. There are extensive differences from its peers in Chrome's minimalistic user interface, which is a typical of modern web browsers. Chrome's strength is its application performance and JavaScript processing speed, both of which were independently verified by multiple websites to be the swiftest among the major browsers of its time.
Security Chrome periodically retrieves updates of two blacklists , and warns users when they attempt to visit a harmful site. On 12 January 2011 versions of Chrome prior to version 8.0.552.237 were identified by US-CERT as "contain[ing] multiple memory corruption vulnerabilities...By convincing a user to view a specially crafted HTML document, PDF file, or video file, an attacker can cause the application to crash or possibly execute arbitrary code."
PERA
December 9, 1996 Features include tabbed browsing, page zooming, mouse gestures, and an integrated download manager. Its security features include built-in phishing and malware protection, strong encryption when browsing secure websites, and the ability to easily delete private data such as HTTP cookies. Opera is the only commercial web browser available for the Nintendo DS and Wii gaming systems.
MAXTHON
17.2MB size Maxthon has developed a growing user base since its initial release in 2003, especially in China. 2.1 Version 1.x 2.2 Version 2.x 2.3 Version 3.x 2.4 Maxthon Mobile for Android 1.x
SAFARI
developed by Apple and included as part of the Mac OS X operating system. January 7, 2003 Safari is also the native browser for iOS. A version of Safari for the Microsoft Windows operating system, first released on June 11, 2007, supports Windows XP, Windows Vista, and Windows 7.
SeaMonkey
Is a free and open source cross-platform Internet suite. It is the continuation of the former Mozilla Application Suite, based on the same source code. Core Mozilla project source code is licensed under a disjunctive tri-license that gives the choice of one of the three following sets of licensing terms: Mozilla Public License, version 1.1 or later, GNU General Public License, version 2.0 or later, GNU Lesser General Public License, version 2.1 or later. The development of SeaMonkey is community-driven, in contrast to the Mozilla Application Suite, which until its last released version (1.7.13) was governed by the Mozilla Foundation. The new project-leading group is the SeaMonkey Council.
FLOCK
April 11, 2005  is a web browser that specializes in providing social networking and Web 2.0 facilities built into its user interface. Earlier versions of Flock used the Gecko HTML rendering engine by Mozilla. Version 2.6.2, released in July 2010, was the last version based on Mozilla. Starting with version 3, Flock is based on Chromium and so uses the Web Kit rendering engine. Flock is available as a free download, and supports Microsoft Windows, Mac OS X, Linux and FreeBSD platforms.
USIBILITY native sharing of text, links, photos and videos a "Media Bar" showing preview of online videos and photos as well as subscription to photo and video feeds a feed readersupporting Atom, RSS, and Media RSS feeds a blog editor and reader, allowing direct posting into any designated blog a Webkit-mail component allowing users to check supported web-based email off site, compose new messages, and drag-and-drop pictures and videos from the "Media Bar" or webclipboard into a new email message support for third-party add-ons, including a number of Firefox extensions.
CAMINO
February 13, 2002 designed for the Mac OS X operating system
DEEPNET
is a web browser created by Deepnet Security for the Microsoft Windowsplatform. The most recent version is 1.5.3 (BETA 3) which was Released October 19, 2006. Developed in Britain, Deepnet Explorer gained early recognition both for its use of anti-phishing tools and the inclusion of apeer-to-peer facility for file sharing, based on the Gnutella network. The anti-phishing feature, in combination with other additions, led the developers to claim that it had a higher level of security than either Firefox or Internet Explorer—however, as the underlying rendering engine was still the same as that employed in Internet Explorer, it was suggested that the improved security would fail to address the vulnerabilities found in the rendering engine
NETSURF
After five years of development, the first stable version of the browser was released on 19 May 2007 to coincide with the Wakefield RISC OS show. Version 1.0 was made available for download from the project's web site and the software was sold on CD at the show. n May 2009 NetSurf 2.1 was released, with improvements to page layout and bug fixes.
PASHEOUT
is a flash-based shell for Internet Explorer. It adds some really impressive looking graphics and customizable skins to your Internet browsing experience. If futuristic looks and space inspired graphics are your thing, you might want to consider PhaseOut. PhaseOuthas most of the essential features, but still lacks some of the nice bonus features such as a password manager, feeds, or parental controls. PhaseOut aims to be completely customizable and tailored to easy surfing. While the remote function is innovative, it seems unnecessary and doesn't add a lot of utility. PhaseOut provides most of the tools of a good browser, but they are not as easy to use as we would like. PhaseOutcomes with top-notch security features, including anti-phishing. Since it's Internet Explorer based you can also remove your browsing history quickly.
2004, 6–7 yearsago Is a freeware web browser from a Chinese programmer named Anderson Che, which unites the Trident layout engine built into Windows with an interface intended to be more feature-rich, flexible and ergonomic than Microsoft's Internet Explorer. It runs on Windows 98and above, including Windows Vista. As of November 2008, total downloads surpassed 22.5 million. Avant 11. on January 26, 2011 introduces more new features
Browsers

More Related Content

What's hot

Web browsers
Web browsersWeb browsers
Web browserslearnt
 
Browsers by NGE
Browsers by NGEBrowsers by NGE
Browsers by NGE
Nicolas Espinosa
 
Internet browsers by Andres Haydar
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres HaydarAndresHaydar
 
Web browsertico
Web browserticoWeb browsertico
Web browsertico
tico3195
 
Browsers
BrowsersBrowsers
Browsers
danielmantillab
 
Web browers
Web browersWeb browers
Web browers
Rishabh Shrivastava
 

What's hot (13)

Web browsers
Web browsersWeb browsers
Web browsers
 
Web browser
Web browserWeb browser
Web browser
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers by NGE
Browsers by NGEBrowsers by NGE
Browsers by NGE
 
Internet browsers by Andres Haydar
Internet browsers by Andres HaydarInternet browsers by Andres Haydar
Internet browsers by Andres Haydar
 
Browsers
BrowsersBrowsers
Browsers
 
Web browsertico
Web browserticoWeb browsertico
Web browsertico
 
Browsers
BrowsersBrowsers
Browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browers
Web browersWeb browers
Web browers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 

Viewers also liked

Search Engine Copywriting
Search Engine CopywritingSearch Engine Copywriting
Search Engine Copywriting
Studio Cappello | Digital Marketing
 
Web searching
Web searchingWeb searching
Web searching
ITOCA
 
What is a Social Media?
What is a Social Media?What is a Social Media?
What is a Social Media?
Alberto D'Ottavi
 
Web Browser
Web BrowserWeb Browser
Web Browser
Eduard Roccatello
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
LinkedIn
 

Viewers also liked (7)

Buscadores
BuscadoresBuscadores
Buscadores
 
Search Engine Copywriting
Search Engine CopywritingSearch Engine Copywriting
Search Engine Copywriting
 
Web searching
Web searchingWeb searching
Web searching
 
Opera browser
Opera browserOpera browser
Opera browser
 
What is a Social Media?
What is a Social Media?What is a Social Media?
What is a Social Media?
 
Web Browser
Web BrowserWeb Browser
Web Browser
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Browsers

Browsers
BrowsersBrowsers
BrowsersADLEG
 
Surfing of the internet
Surfing of the internetSurfing of the internet
Surfing of the internet
Maria Camila Garcia
 
Web browsers
Web browsersWeb browsers
Browser of internet 2011
Browser of internet 2011Browser of internet 2011
Browser of internet 2011Jose Rincon
 
Browser of internet 2011
Browser of internet 2011Browser of internet 2011
Browser of internet 2011Jose Rincon
 
Web browsers
Web browsersWeb browsers
Web browsers
carlos19995
 
Browsers
BrowsersBrowsers
Browsers
BrowsersBrowsers
Browsers
Camilo Antia
 
Browsers
BrowsersBrowsers
Browsers
Camilo Antia
 
Browsers
BrowsersBrowsers
Browsers
Camilo Antia
 

Similar to Browsers (20)

Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Surfing of the internet
Surfing of the internetSurfing of the internet
Surfing of the internet
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Browser of internet 2011
Browser of internet 2011Browser of internet 2011
Browser of internet 2011
 
Browser of internet 2011
Browser of internet 2011Browser of internet 2011
Browser of internet 2011
 
Web Browsers
 Web Browsers Web Browsers
Web Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 
Browsers
BrowsersBrowsers
Browsers
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Browsers

  • 3. Internet Explorer is the most widely-used web browser, although since 2004 it began losing usage share to other browsers. The current estimation is about 90 percentage of the total usage.
  • 4. Internet Explorer 1August 16, 1995. Internet Explorer 2 November 22, 1995. Internet Explorer 3 August 13, 1996. Internet Explorer 4 September 1997. Internet Explorer 5 March 18, 1999. Internet Explorer 6 August 27, 2001. Internet Explorer 7 October 18, 2006. Internet Explorer 8 March 19, 2009. Internet Explorer 9 March 14,2011. 
  • 5. security Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions. Internet Explorer has been subjected to many security vulnerabilities and concerns: Much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page in order to install themselves.
  • 6. Usability and accessibility Internet Explorer makes use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to that of Windows Explorer. Pop-up blocking and tabbed browsing were added respectively in Internet Explorer 6 and Internet Explorer 7. Tabbed browsing can also be added to older versions by installing MSN Search Toolbaror Yahoo Toolbar
  • 8. November 9, 2004 Version 2.0- Version 3.0- Version 3.5- Version 3.6- Version 4.0-Firefox for mobile --Version 5, 6 & 7 (Future developments) size 19 MB– Windows19 MB – Mac OS X10 MB – GNU/Linux49 MB – sourcecode
  • 9. Security is considered as the browser with the most reliable security. Firefox uses a sandbox security model, and limits scripts from accessing data from other web sites based on the same origin policy. It uses SSL/TLS to protect communications with web servers using strong cryptography when using the HTTPS protocol. It also provides support for web applications to use smartcards for authentication purposes.
  • 10.
  • 11.
  • 12. September 2, 2008 Google Chrome aims to be secure, fast, simpleand stable. There are extensive differences from its peers in Chrome's minimalistic user interface, which is a typical of modern web browsers. Chrome's strength is its application performance and JavaScript processing speed, both of which were independently verified by multiple websites to be the swiftest among the major browsers of its time.
  • 13. Security Chrome periodically retrieves updates of two blacklists , and warns users when they attempt to visit a harmful site. On 12 January 2011 versions of Chrome prior to version 8.0.552.237 were identified by US-CERT as "contain[ing] multiple memory corruption vulnerabilities...By convincing a user to view a specially crafted HTML document, PDF file, or video file, an attacker can cause the application to crash or possibly execute arbitrary code."
  • 14.
  • 15. PERA
  • 16. December 9, 1996 Features include tabbed browsing, page zooming, mouse gestures, and an integrated download manager. Its security features include built-in phishing and malware protection, strong encryption when browsing secure websites, and the ability to easily delete private data such as HTTP cookies. Opera is the only commercial web browser available for the Nintendo DS and Wii gaming systems.
  • 17.
  • 19. 17.2MB size Maxthon has developed a growing user base since its initial release in 2003, especially in China. 2.1 Version 1.x 2.2 Version 2.x 2.3 Version 3.x 2.4 Maxthon Mobile for Android 1.x
  • 20.
  • 22. developed by Apple and included as part of the Mac OS X operating system. January 7, 2003 Safari is also the native browser for iOS. A version of Safari for the Microsoft Windows operating system, first released on June 11, 2007, supports Windows XP, Windows Vista, and Windows 7.
  • 23.
  • 25. Is a free and open source cross-platform Internet suite. It is the continuation of the former Mozilla Application Suite, based on the same source code. Core Mozilla project source code is licensed under a disjunctive tri-license that gives the choice of one of the three following sets of licensing terms: Mozilla Public License, version 1.1 or later, GNU General Public License, version 2.0 or later, GNU Lesser General Public License, version 2.1 or later. The development of SeaMonkey is community-driven, in contrast to the Mozilla Application Suite, which until its last released version (1.7.13) was governed by the Mozilla Foundation. The new project-leading group is the SeaMonkey Council.
  • 26.
  • 27. FLOCK
  • 28. April 11, 2005  is a web browser that specializes in providing social networking and Web 2.0 facilities built into its user interface. Earlier versions of Flock used the Gecko HTML rendering engine by Mozilla. Version 2.6.2, released in July 2010, was the last version based on Mozilla. Starting with version 3, Flock is based on Chromium and so uses the Web Kit rendering engine. Flock is available as a free download, and supports Microsoft Windows, Mac OS X, Linux and FreeBSD platforms.
  • 29. USIBILITY native sharing of text, links, photos and videos a "Media Bar" showing preview of online videos and photos as well as subscription to photo and video feeds a feed readersupporting Atom, RSS, and Media RSS feeds a blog editor and reader, allowing direct posting into any designated blog a Webkit-mail component allowing users to check supported web-based email off site, compose new messages, and drag-and-drop pictures and videos from the "Media Bar" or webclipboard into a new email message support for third-party add-ons, including a number of Firefox extensions.
  • 30.
  • 32. February 13, 2002 designed for the Mac OS X operating system
  • 33.
  • 35. is a web browser created by Deepnet Security for the Microsoft Windowsplatform. The most recent version is 1.5.3 (BETA 3) which was Released October 19, 2006. Developed in Britain, Deepnet Explorer gained early recognition both for its use of anti-phishing tools and the inclusion of apeer-to-peer facility for file sharing, based on the Gnutella network. The anti-phishing feature, in combination with other additions, led the developers to claim that it had a higher level of security than either Firefox or Internet Explorer—however, as the underlying rendering engine was still the same as that employed in Internet Explorer, it was suggested that the improved security would fail to address the vulnerabilities found in the rendering engine
  • 36.
  • 38. After five years of development, the first stable version of the browser was released on 19 May 2007 to coincide with the Wakefield RISC OS show. Version 1.0 was made available for download from the project's web site and the software was sold on CD at the show. n May 2009 NetSurf 2.1 was released, with improvements to page layout and bug fixes.
  • 39.
  • 41. is a flash-based shell for Internet Explorer. It adds some really impressive looking graphics and customizable skins to your Internet browsing experience. If futuristic looks and space inspired graphics are your thing, you might want to consider PhaseOut. PhaseOuthas most of the essential features, but still lacks some of the nice bonus features such as a password manager, feeds, or parental controls. PhaseOut aims to be completely customizable and tailored to easy surfing. While the remote function is innovative, it seems unnecessary and doesn't add a lot of utility. PhaseOut provides most of the tools of a good browser, but they are not as easy to use as we would like. PhaseOutcomes with top-notch security features, including anti-phishing. Since it's Internet Explorer based you can also remove your browsing history quickly.
  • 42.
  • 43.
  • 44. 2004, 6–7 yearsago Is a freeware web browser from a Chinese programmer named Anderson Che, which unites the Trident layout engine built into Windows with an interface intended to be more feature-rich, flexible and ergonomic than Microsoft's Internet Explorer. It runs on Windows 98and above, including Windows Vista. As of November 2008, total downloads surpassed 22.5 million. Avant 11. on January 26, 2011 introduces more new features