Browser security, Basic Computer Science

Browser Security:

WWW is used for many applications today including Banking, reservation, trading,  e-commence and many such applications which require security and confidentiality of data. However, HTTP was not a secure protocol. Thus, a secure HTTP protocol was developed for applications that required secure communication channel over an unsecured network. This is called HTTP Secure and most of the contemporary browsers support this HTTPS protocol. Thus, if you are browsing a secure website then you will find https:// at the beginning. In case, you are browsing from a public computer then you must delete the contents of web cache, cookies and browsing history. All browsers provide simple way of doing this task.   

Posted Date: 10/23/2012 6:18:35 AM | Location : United States







Related Discussions:- Browser security, Assignment Help, Ask Question on Browser security, Get Answer, Expert's Help, Browser security Discussions

Write discussion on Browser security
Your posts are moderated
Related Questions
INTRODUCTION : In the earlier units of this block you learnt the importance of proper filing and record keeping. You are also aware that in laboratory organisation and management,

THE FIRST GENERATION (1949-1955) The computers in this generation have the following characteristics:     Physically large in size     Inflexible in operations

Input Devices Keyboard Keyboard is the device through which the commands, instructions required for execution of a program is entered. It consists of a number of

There is a path between two vertices if there is a series of edges that you can use to travel between them. For example, between vertices 1 and 3 above, there is a path made up of

OSI Layers: Open Systems Interconnection model is a reference model developed by International Organization for Standardization in 1984, as a conceptual structure of principles fo

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy.

Consider a class called Configuration. This class “encapsulates” the configuration management for any software system. For example, once created, the user can simply ask the config

Conditional constructs are used to integrate decision making into programs. The outcome of this decision making determines the series in which a program will execute instructions.

Explain Canonical cover and Extraneous Attributes with examples.

Question (a) What do we signifies by saying that HTTP is a stateless protocol? (b) Explain three ways of working around that statelessness issue (c) Explain with the help