SlideShare a Scribd company logo
Firefox is an alternative
web browser to other web
browser.
Chipped web browser away
from other these, Firefox
established a credit from
users, and got a popularity
all over the world.
Firefox has a World Record
to be downloaded by
8,002,530 users in only one
day.
Firefox is owned by Mozilla. Mozilla is a non-profit group, and
it made Firefox to be able to see and use an open source free
of charge and permission.


 2002 – Mozilla 1.0 was released.
 2003 – Mozilla Foundation is established.
 2004 – Firefox 1.0 was released.
 2008 – Firefox 3.0 was released, and Firefox found achieved
World Record.
 2011 – Firefox 4.0, 5.0, 6.0, 7.0, 8.0 was released.


The first name of Firefox was Phoenix, but the name is same
as Phoenix technology’s symbol. SO it changed the name
Firebird from Phoenix. But, the name had been used by
database software yet. After these changes, the browser
name became Firefox.
Firefox is similar to IE,
but there is a
difference on their
security. Firefox is
safe, because Firefox
introduce Content
Security Policy and
HTTP Strict Transport
Security. But, IE is
safer than Firefox
because there is a
data on their security
report.
Firefox has an origin of tabbed browsing. And
Firefox has build in pop-up blocker and cross-
platform application that means that have
interchangeability in each OS.
Firefox browser has many extensions.

 ・Greasemonkey
    You can customize Firefox browser displays and behaves.
 ・Statusbar Clock
    Display clock and date on the statusbar. It can customize the
form.
 ・Snap Links
    When you click, linked link is displayed in new tabs.
 ・Firebug
    It makes users possible to create their HTML, CSS or JavaScript
while creating web pages standing.
Firefox controls own security because
other security tool have possibility to be
tracked by cracker. And Firefox has
Favicon that is a small icon at the left side
of URL, and warning sign. So Favicon tells
user whether the web page is safe or not.
Someone may think Firefox is loose on the
security because Firefox is an open source
program. But, the security on sources is
set up. So the security is so strong.

More Related Content

What's hot

Week11
Week11Week11
Week11
s1180181
 
Mozila firefox The Internet Browser
Mozila firefox The Internet BrowserMozila firefox The Internet Browser
Mozila firefox The Internet Browser
Gurpreet Singh
 
Firefox security (prasanna)
Firefox security (prasanna) Firefox security (prasanna)
Firefox security (prasanna) ClubHack
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Worksguest9cf68c
 
Week11
Week11Week11
Week11
tuningB4d
 
Web browers
Web browersWeb browers
Web browers
Rishabh Shrivastava
 
Week11
Week11Week11
Week11so3137
 
Web browsertico
Web browserticoWeb browsertico
Web browsertico
tico3195
 
Browsers by NGE
Browsers by NGEBrowsers by NGE
Browsers by NGE
Nicolas Espinosa
 

What's hot (16)

Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
Week11
Week11Week11
Week11
 
Mozila firefox The Internet Browser
Mozila firefox The Internet BrowserMozila firefox The Internet Browser
Mozila firefox The Internet Browser
 
Week11
Week11Week11
Week11
 
Sw2 b11
Sw2 b11Sw2 b11
Sw2 b11
 
Sp W11
Sp W11Sp W11
Sp W11
 
Mozilla firefox
Mozilla firefoxMozilla firefox
Mozilla firefox
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
Firefox security (prasanna)
Firefox security (prasanna) Firefox security (prasanna)
Firefox security (prasanna)
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Week11
Week11Week11
Week11
 
Web browers
Web browersWeb browers
Web browers
 
Week11
Week11Week11
Week11
 
Web browsertico
Web browserticoWeb browsertico
Web browsertico
 
Web browsers
Web browsersWeb browsers
Web browsers
 
Browsers by NGE
Browsers by NGEBrowsers by NGE
Browsers by NGE
 

Viewers also liked

M2M-creating a smarter world
M2M-creating a smarter worldM2M-creating a smarter world
M2M-creating a smarter worldScott Pollard
 
Car Parking System & Rotary Table by Sky Park Engineering, Mumbai
Car Parking System & Rotary Table by Sky Park Engineering, MumbaiCar Parking System & Rotary Table by Sky Park Engineering, Mumbai
Car Parking System & Rotary Table by Sky Park Engineering, Mumbai
IndiaMART InterMESH Limited
 
An Online Car Parking System (Features & Diagrams Only)
An Online Car Parking System (Features & Diagrams Only)An Online Car Parking System (Features & Diagrams Only)
An Online Car Parking System (Features & Diagrams Only)
Jubayer Al Mahmud
 
RFID based car parking system-final ver
RFID based car parking system-final verRFID based car parking system-final ver
RFID based car parking system-final verDebasis Nayak
 
AUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEMAUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEMsowmya Sowmya
 

Viewers also liked (6)

Review of car parking policy
Review of car parking policyReview of car parking policy
Review of car parking policy
 
M2M-creating a smarter world
M2M-creating a smarter worldM2M-creating a smarter world
M2M-creating a smarter world
 
Car Parking System & Rotary Table by Sky Park Engineering, Mumbai
Car Parking System & Rotary Table by Sky Park Engineering, MumbaiCar Parking System & Rotary Table by Sky Park Engineering, Mumbai
Car Parking System & Rotary Table by Sky Park Engineering, Mumbai
 
An Online Car Parking System (Features & Diagrams Only)
An Online Car Parking System (Features & Diagrams Only)An Online Car Parking System (Features & Diagrams Only)
An Online Car Parking System (Features & Diagrams Only)
 
RFID based car parking system-final ver
RFID based car parking system-final verRFID based car parking system-final ver
RFID based car parking system-final ver
 
AUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEMAUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEM
 

Similar to How Firefox Work

Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentationray0510711s
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Workss1170024
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
web browsers
web browsersweb browsers
web browsers
simonmartinez94
 
Sw homework week11
Sw homework week11Sw homework week11
Sw homework week11s1200001
 
Getting Started with Firefox
Getting Started with FirefoxGetting Started with Firefox
Getting Started with FirefoxAsmaa El-Bamby
 
Firefox by jawad
Firefox by jawadFirefox by jawad
Firefox by jawad
JawadAyub420
 
MIS Project Presentation
MIS Project Presentation MIS Project Presentation
MIS Project Presentation wa9088
 
MIS Project Presentation
MIS Project PresentationMIS Project Presentation
MIS Project Presentationwa9088
 
my Assignment, on browsers | computer
my Assignment, on browsers | computermy Assignment, on browsers | computer
my Assignment, on browsers | computer
Nazish Jamali
 
W11ps
W11psW11ps
W11psjack
 
How firefox works
How firefox worksHow firefox works
How firefox works6rooney
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
carmausve
 
browser of the actuality
browser of the actualitybrowser of the actuality
browser of the actuality
carlosmau-95
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
carmausve
 
Browsers in the actuality.
Browsers in the actuality.Browsers in the actuality.
Browsers in the actuality.
carlosmau-95
 

Similar to How Firefox Work (20)

無題 1
無題 1無題 1
無題 1
 
Individual Slide Presentation
Individual Slide PresentationIndividual Slide Presentation
Individual Slide Presentation
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw2
Sw2Sw2
Sw2
 
Firefox
FirefoxFirefox
Firefox
 
web browsers
web browsersweb browsers
web browsers
 
Sw homework week11
Sw homework week11Sw homework week11
Sw homework week11
 
Getting Started with Firefox
Getting Started with FirefoxGetting Started with Firefox
Getting Started with Firefox
 
Firefox by jawad
Firefox by jawadFirefox by jawad
Firefox by jawad
 
MIS Project Presentation
MIS Project Presentation MIS Project Presentation
MIS Project Presentation
 
MIS Project Presentation
MIS Project PresentationMIS Project Presentation
MIS Project Presentation
 
my Assignment, on browsers | computer
my Assignment, on browsers | computermy Assignment, on browsers | computer
my Assignment, on browsers | computer
 
W11ps
W11psW11ps
W11ps
 
How firefox works
How firefox worksHow firefox works
How firefox works
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
browser of the actuality
browser of the actualitybrowser of the actuality
browser of the actuality
 
Browser (1)
Browser (1)Browser (1)
Browser (1)
 
Browsers in the actuality.
Browsers in the actuality.Browsers in the actuality.
Browsers in the actuality.
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

How Firefox Work

  • 1. Firefox is an alternative web browser to other web browser. Chipped web browser away from other these, Firefox established a credit from users, and got a popularity all over the world. Firefox has a World Record to be downloaded by 8,002,530 users in only one day.
  • 2. Firefox is owned by Mozilla. Mozilla is a non-profit group, and it made Firefox to be able to see and use an open source free of charge and permission. 2002 – Mozilla 1.0 was released. 2003 – Mozilla Foundation is established. 2004 – Firefox 1.0 was released. 2008 – Firefox 3.0 was released, and Firefox found achieved World Record. 2011 – Firefox 4.0, 5.0, 6.0, 7.0, 8.0 was released. The first name of Firefox was Phoenix, but the name is same as Phoenix technology’s symbol. SO it changed the name Firebird from Phoenix. But, the name had been used by database software yet. After these changes, the browser name became Firefox.
  • 3. Firefox is similar to IE, but there is a difference on their security. Firefox is safe, because Firefox introduce Content Security Policy and HTTP Strict Transport Security. But, IE is safer than Firefox because there is a data on their security report.
  • 4. Firefox has an origin of tabbed browsing. And Firefox has build in pop-up blocker and cross- platform application that means that have interchangeability in each OS.
  • 5. Firefox browser has many extensions. ・Greasemonkey You can customize Firefox browser displays and behaves. ・Statusbar Clock Display clock and date on the statusbar. It can customize the form. ・Snap Links When you click, linked link is displayed in new tabs. ・Firebug It makes users possible to create their HTML, CSS or JavaScript while creating web pages standing.
  • 6. Firefox controls own security because other security tool have possibility to be tracked by cracker. And Firefox has Favicon that is a small icon at the left side of URL, and warning sign. So Favicon tells user whether the web page is safe or not. Someone may think Firefox is loose on the security because Firefox is an open source program. But, the security on sources is set up. So the security is so strong.