SlideShare una empresa de Scribd logo
1 de 16
4/26/2010
sales@ebusinessmantra.com               1
   Web Browser is a software that is installed on your
    computer. It is used to locate and display web
    pages and other online content. Behind the scene,
    a browser performs lot of functions but its key role
    is to take your request to the web server and bring
    the content to you and display it.




                                                   4/26/2010
                    sales@ebusinessmantra.com                  2
   Finds the web server
   Takes your request and transports data
   Transports cookies
   Brings back content
   Processes the content and renders it
   Executes scripts (code)




                                               4/26/2010
                   sales@ebusinessmantra.com               3
   Enter a URL into a browser
    ◦ Breaks the URL into a host + path
       Asks a DNS server for an IP address for the host
       DNS server returns a IP address for that host
    ◦ Browser sends a request to the IP address
       Path is used to determine what file to obtain
       Data for web server to process, maintain state
       Server replies to the request – HTML, PDF, mp3, etc.
    ◦ Browser reads the HTML file and asks for all the files referenced in the
      original HTML file
       These additional files could be images, more HTML, or other types on content.
       Additional files could reside on different hosts requiring more DNS requests
       After browser gets all the pieces, it processes the data and renders a single
        “page”
       Non-HTML file are opened in the browser of associated application.




                                                                               4/26/2010
                            sales@ebusinessmantra.com                                      4
   Internet Explorer (Microsoft)
   Firefox
   Safari
   Chrome
   Opera
   Konqueror
   Several others




                                                4/26/2010
                    sales@ebusinessmantra.com               5
4/26/2010
sales@ebusinessmantra.com               6
   Data set by the web site owner
   Data you enter in the form
   Information you request
   Cookies
   Operating System, browser type
   Your IP address – can help determine your
    geographical location
   Referring page
   Much more


                                                4/26/2010
                  sales@ebusinessmantra.com                 7
   Example URLs:
    ◦ http://www.somesite.com
    ◦ https://www.somesite.com
    http – data is unencrypted while transport from the web
      browser to the web server
    https – data is encrypted while transported from the
      browser to the web server
    Make sure that data you don’t want anyone to eavesdrop is
      encrypted – https in the address bar; closed lock in the
      status bar



                                                         4/26/2010
                     sales@ebusinessmantra.com                       8
4/26/2010
sales@ebusinessmantra.com               9
   Use one browser for your “important” surfing and another for “casual”
    browsing. That way data from one can't leak to the other (generally
    speaking)
   Always keep an eye on the URL in the address bar
   Read, Pause before clicking on anything
   Logout and always close the browser window
   Nothing is “really” free. Only download
    files from websites you trust
   Don’t open attachments forwarded from your friend’s computer is
    corrupted
   Logout and close browser/tab
   The browser’s back and refresh features can be used to steal
    passwords from insecurely written applications.
   Be careful of Google search results
   Always type URL for sites where confidential information is in use.




                                                                     4/26/2010
                          sales@ebusinessmantra.com                              10
 Always use the red “X”
            in the corner of a pop-up
            screen

             Never click “yes,”
            “accept” or even “cancel”,
            because it could be a trick
            that installs software on
            your PC




                                          4/26/2010
sales@ebusinessmantra.com                             11
An Internet firewall
                   is like a moat
                   around a castle,
                   creating a barrier
                   between
                   your computer and
                   the Internet




                                    4/26/2010
sales@ebusinessmantra.com                       12
   Search results may contain malicious web site
   Does it make sense?




                                                    4/26/2010
                   sales@ebusinessmantra.com
   Keep passwords private and create ones that are
    hard to “crack”
   Use password checker (See resources)
    Never share your passwords with friends or be
    tricked into giving them away
   Do not email login name and password together
   Do not text message your login information
   If you do have to write, keep the paper in safe
    keeping


                                                4/26/2010
                   sales@ebusinessmantra.com                14
   Avoid creating passwords using
    ◦ Dictionary words in any language.
      Words in all languages are vulnerable
      Words spelled backwards, common misspellings, and
       abbreviations
    ◦ Sequences or repeated characters.
      Examples: 12345678, 222222, abcdefg, or adjacent letters
       on your keyboard (qwerty)
    ◦ Personal information.
      Your name, birthday, driver's license, passport number, or
       similar information



                                                              4/26/2010
                      sales@ebusinessmantra.com                           15
   Web browser
    ◦ http://en.wikipedia.org/wiki/Web_browser
   How browser works
    ◦ http://taligarsiel.com/Projects/howbrowserswork1.htm
   Securing your browser
    ◦ http://www.cert.org/tech_tips/securing_browser/
   Analysis: Browser Security
    ◦ http://www.networkcomputing.com/wireless/analysis-browser-
      security.php
   Microsoft Online Safety
    ◦ http://www.microsoft.com/protect
   Get Wise
    ◦ http://www.getnetwise.org
   Password Checker
    ◦ https://www.microsoft.com/protect/fraud/passwords/checker.aspx?WT.mc
      _id=Site_Link


                                                                    4/26/2010
                          sales@ebusinessmantra.com                             16

Más contenido relacionado

La actualidad más candente

Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewalldavidjohnrace
 
Https presentation
Https presentationHttps presentation
Https presentationpatel jatin
 
SSL Certificates and Operations
SSL Certificates and OperationsSSL Certificates and Operations
SSL Certificates and OperationsNisheed KM
 
CISM certification-2157009
CISM certification-2157009CISM certification-2157009
CISM certification-2157009Prakhar Varshney
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol BasicChuong Mai
 
Principi di crittografia
Principi di crittografiaPrincipi di crittografia
Principi di crittografiapeppespe
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug BountiesOWASP Nagpur
 
Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...
Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...
Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...Дмитрий Бумов
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 
Weaponizing Recon - Smashing Applications for Security Vulnerabilities & Profits
Weaponizing Recon - Smashing Applications for Security Vulnerabilities & ProfitsWeaponizing Recon - Smashing Applications for Security Vulnerabilities & Profits
Weaponizing Recon - Smashing Applications for Security Vulnerabilities & ProfitsHarsh Bothra
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android ApplicationsCláudio André
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 
Reverse proxies & Inconsistency
Reverse proxies & InconsistencyReverse proxies & Inconsistency
Reverse proxies & InconsistencyGreenD0g
 

La actualidad más candente (20)

Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
 
Https presentation
Https presentationHttps presentation
Https presentation
 
SSL Certificates and Operations
SSL Certificates and OperationsSSL Certificates and Operations
SSL Certificates and Operations
 
CISM certification-2157009
CISM certification-2157009CISM certification-2157009
CISM certification-2157009
 
CORS and (in)security
CORS and (in)securityCORS and (in)security
CORS and (in)security
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
 
Principi di crittografia
Principi di crittografiaPrincipi di crittografia
Principi di crittografia
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug Bounties
 
Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...
Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...
Zeronights 2016 | A blow under the belt. How to avoid WAF/IPS/DLP | Удар ниже...
 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Weaponizing Recon - Smashing Applications for Security Vulnerabilities & Profits
Weaponizing Recon - Smashing Applications for Security Vulnerabilities & ProfitsWeaponizing Recon - Smashing Applications for Security Vulnerabilities & Profits
Weaponizing Recon - Smashing Applications for Security Vulnerabilities & Profits
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
File upload vulnerabilities & mitigation
File upload vulnerabilities & mitigationFile upload vulnerabilities & mitigation
File upload vulnerabilities & mitigation
 
Ssrf
SsrfSsrf
Ssrf
 
SSl/TLS Analysis
SSl/TLS AnalysisSSl/TLS Analysis
SSl/TLS Analysis
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Mime sniffing
Mime sniffingMime sniffing
Mime sniffing
 
Reverse proxies & Inconsistency
Reverse proxies & InconsistencyReverse proxies & Inconsistency
Reverse proxies & Inconsistency
 

Destacado

Password management for you
Password management for youPassword management for you
Password management for youChit Ko Ko Win
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Destacado (6)

Java Regular Expression PART II
Java Regular Expression PART IIJava Regular Expression PART II
Java Regular Expression PART II
 
Password management for you
Password management for youPassword management for you
Password management for you
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar a Safer browsing

Hhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyHhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyShoaib Sheikh
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Defensive programing 101
Defensive programing 101Defensive programing 101
Defensive programing 101Niall Merrigan
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxiesseldridgeD9
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library ProgramRino Landa
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistPixel Crayons
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptxmtsedey2013
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17msz
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptxdereje33
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 

Similar a Safer browsing (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Hhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyHhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacy
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Defensive programing 101
Defensive programing 101Defensive programing 101
Defensive programing 101
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxies
 
Browser security — ROOTS
Browser security — ROOTSBrowser security — ROOTS
Browser security — ROOTS
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library Program
 
Unit6
Unit6Unit6
Unit6
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptx
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Is Drupal Secure?
Is Drupal Secure?Is Drupal Secure?
Is Drupal Secure?
 
Is Drupal secure?
Is Drupal secure?Is Drupal secure?
Is Drupal secure?
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptx
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 

Último

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Último (20)

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 

Safer browsing

  • 2. Web Browser is a software that is installed on your computer. It is used to locate and display web pages and other online content. Behind the scene, a browser performs lot of functions but its key role is to take your request to the web server and bring the content to you and display it. 4/26/2010 sales@ebusinessmantra.com 2
  • 3. Finds the web server  Takes your request and transports data  Transports cookies  Brings back content  Processes the content and renders it  Executes scripts (code) 4/26/2010 sales@ebusinessmantra.com 3
  • 4. Enter a URL into a browser ◦ Breaks the URL into a host + path  Asks a DNS server for an IP address for the host  DNS server returns a IP address for that host ◦ Browser sends a request to the IP address  Path is used to determine what file to obtain  Data for web server to process, maintain state  Server replies to the request – HTML, PDF, mp3, etc. ◦ Browser reads the HTML file and asks for all the files referenced in the original HTML file  These additional files could be images, more HTML, or other types on content.  Additional files could reside on different hosts requiring more DNS requests  After browser gets all the pieces, it processes the data and renders a single “page”  Non-HTML file are opened in the browser of associated application. 4/26/2010 sales@ebusinessmantra.com 4
  • 5. Internet Explorer (Microsoft)  Firefox  Safari  Chrome  Opera  Konqueror  Several others 4/26/2010 sales@ebusinessmantra.com 5
  • 7. Data set by the web site owner  Data you enter in the form  Information you request  Cookies  Operating System, browser type  Your IP address – can help determine your geographical location  Referring page  Much more 4/26/2010 sales@ebusinessmantra.com 7
  • 8. Example URLs: ◦ http://www.somesite.com ◦ https://www.somesite.com http – data is unencrypted while transport from the web browser to the web server https – data is encrypted while transported from the browser to the web server Make sure that data you don’t want anyone to eavesdrop is encrypted – https in the address bar; closed lock in the status bar 4/26/2010 sales@ebusinessmantra.com 8
  • 10. Use one browser for your “important” surfing and another for “casual” browsing. That way data from one can't leak to the other (generally speaking)  Always keep an eye on the URL in the address bar  Read, Pause before clicking on anything  Logout and always close the browser window  Nothing is “really” free. Only download files from websites you trust  Don’t open attachments forwarded from your friend’s computer is corrupted  Logout and close browser/tab  The browser’s back and refresh features can be used to steal passwords from insecurely written applications.  Be careful of Google search results  Always type URL for sites where confidential information is in use. 4/26/2010 sales@ebusinessmantra.com 10
  • 11.  Always use the red “X” in the corner of a pop-up screen  Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC 4/26/2010 sales@ebusinessmantra.com 11
  • 12. An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet 4/26/2010 sales@ebusinessmantra.com 12
  • 13. Search results may contain malicious web site  Does it make sense? 4/26/2010 sales@ebusinessmantra.com
  • 14. Keep passwords private and create ones that are hard to “crack”  Use password checker (See resources)  Never share your passwords with friends or be tricked into giving them away  Do not email login name and password together  Do not text message your login information  If you do have to write, keep the paper in safe keeping 4/26/2010 sales@ebusinessmantra.com 14
  • 15. Avoid creating passwords using ◦ Dictionary words in any language.  Words in all languages are vulnerable  Words spelled backwards, common misspellings, and abbreviations ◦ Sequences or repeated characters.  Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) ◦ Personal information.  Your name, birthday, driver's license, passport number, or similar information 4/26/2010 sales@ebusinessmantra.com 15
  • 16. Web browser ◦ http://en.wikipedia.org/wiki/Web_browser  How browser works ◦ http://taligarsiel.com/Projects/howbrowserswork1.htm  Securing your browser ◦ http://www.cert.org/tech_tips/securing_browser/  Analysis: Browser Security ◦ http://www.networkcomputing.com/wireless/analysis-browser- security.php  Microsoft Online Safety ◦ http://www.microsoft.com/protect  Get Wise ◦ http://www.getnetwise.org  Password Checker ◦ https://www.microsoft.com/protect/fraud/passwords/checker.aspx?WT.mc _id=Site_Link 4/26/2010 sales@ebusinessmantra.com 16