Analiza Osobina Web Preglednika

Total Page:16

File Type:pdf, Size:1020Kb

Analiza Osobina Web Preglednika SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE V A R A Ţ D I N Robert Ivanović ANALIZA OSOBINA WEB PREGLEDNIKA SEMINARSKI RAD Varaţdin, 2009. SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE V A R A Ţ D I N Robert Ivanović Izvanredni student Broj indeksa: S-36348/07-I, 2007. Smjer: Primjena informacijske tehnologije u poslovanju VI/1 stupanj ANALIZA OSOBINA WEB PREGLEDNIKA SEMINARSKI RAD Voditelj rada: Dr. sc. Dragutin Kermek Varaţdin, svibanj 2009. 2 Sadrţaj 1. Uvod ................................................................................................................................................... 4 1.1. Razvoj web preglednika......................................................................................................................... 4 1.2. Najvažniji podaci o web preglednicima ............................................................................................. 6 1.3. Web preglednici s posebnim namjenama .................................................................................... 9 1.4. Tekstualni web preglednici s početka ere interneta .................................................................. 10 1.5. Web preglednici za mobilnu platformu(mobitele ili PDA) ...................................................... 10 1.6. Web preglednici za Java platformu ......................................................................................... 10 1.7. Web preglednici za djecu .......................................................................................................... 10 2. Osobine web preglednika i njihova analiza .................................................................................... 11 2.1. Najvažnije osobine ...............................................................................................................................12 2.2. Dodatne osobine .................................................................................................................................... 15 2.2.1.Podrška protokolima .................................................................................................................... 19 2.2.2. Podrška tehnologijama i standardima..................................................................................... 21 2.2.3. Podrška JavaScript tehnologiji .................................................................................................22 2.2.4. Podrška za Plug-in i Web Feed ................................................................................................ 24 2.2.7. Podrška za različite formate slika ............................................................................................. 25 3. Dodaci .............................................................................................................................................. 25 3.1.Acid test ..................................................................................................................................... 25 3.2.Ranjivosti web preglednika ....................................................................................................... 29 3.3. Lokalizacija web preglednika...................................................................................................30 4. Zaključak ......................................................................................................................................... 33 5. Literatura ......................................................................................................................................... 34 6. Linkovi ............................................................................................................................................. 34 Popis slika Slika 1 "Idealni prikaz Acid3 testa u web pregledniku" ...................................................................... 27 Slika 2 "Internet Explorer u Acid3 testu" ............................................................................................ 27 Slika 3 "Opera donedavno u Acid3 testu" ........................................................................................... 28 Slika 4 "Opera 10 BETA Acid3 Test" ................................................................................................. 28 Slika 5 "Firefox na Acid3 testu" .......................................................................................................... 29 Slika 6 "Firefox 3,5 u Beta 4 verziji na Acid3 testu" ............................................................................ 29 Slika 7 "Safari na Acid3 testu" ............................................................................................................. 30 Slika 8 "Google Chrome na Acid3 testu" ............................................................................................ 30 Popis tablica Tabela 1 "Povijesni razvoj (važnijih) web preglednika" ....................................................................... 6 Tabela 2 "Najvažniji podaci o web preglednicima" ................................................................................ 8 Tabela 3 "Osnovne osobine, prva tablica" ............................................................................................ 14 Tabela 4 "Osnovne osobine, druga tablica" .......................................................................................... 15 Tabela 5 "Dodatne osobine, prva tablica" ............................................................................................. 17 Tabela 6 "Dodatne osobine, druga tablica" ........................................................................................... 18 Tabela 7 "Podrška protokolima" ...........................................................................................................21 Tabela 8 "Podrška tehnologijama i standardima" ................................................................................. 22 Tabela 9 "Podrška JavaScript tehnologiji"............................................................................................ 24 Tabela 10 "Lokalizacija web preglednika" .......................................................................................... 31 3 1.Uvod Iako je ime i svrha ovog seminarskog rada analiza osobina web preglednika, autor je smatrao potrebnim započeti radnju opisom pojma web preglednik (engl. Web Browser) i kratkom povijesti razvoja internet preglednika i navođenjem podataka o nekima od važnijih i poznatijih browsera. Za surfanje internetom koristimo aplikacijski sofware sa grafičkim sučeljem koji prevodi HTML kod i prikazuje Internet stranicu i omogućuje korisniku interakciju sa tekstom, slikom, videom, glazbom i dr. multimedijskim sadržajima na internetu. Taj softver se zove web browser, na hrvatskom web preglednik. Tražeći točnu definiciju preko www.google.com pronašao sam hrpu definicija, ali najjednostavnija bi bila ona s weba Princeton univerziteta: „Browser: program korišten za gledanje HTML dokumenata" (wordnet.princeton.edu/perl/webwn). 1.1. Razvoj web preglednika Razvoj nekih važnijih i poznatijih web preglednika: Razvoj web preglednika počinje krajem 80-tih i početkom 90-ih godina prošlog stoljeća. Početkom 1991. Britanski fizičar Tim Berners-Lee patentirao je prvi Internet preglednik WorldWideWeb (http ://info.cern.ch/ ) (ujedno i WYSIWYG ,"what you see is what you get" HTML editor), koji je koristio je ne samo FTP(File Transfer Protocol), nego i HTP(Hypertext Transport Protocol). Slijedio ga je Mosaic, razvijen na NSCA(National Centre for Supercomputing Applications). Marc Andreessen, djelatnik istog centra, pokrenuo je vlastitu kompaniju Netscape, i izumio vlastiti web browser Netscape, koji ubrzo postaje najrašireniji preglednik tog doba, kojeg koristi 90% tadašnjih korisnika interneta. Microsoft odgovara razvojem svojeg browsera Internet Explorer, započinjući prvi rat browsera. Pošto Internet Explorer dolazi u paketu sa OS Windows, uskoro MS IE postaje dominantan i zadržava pokrivenost tržišta sve do danas. U listopadu 1994. na internetu se prvi put pojavljuje novi Netscape-ov preglednika Mozilla. 1998. Netscape postaje Mozilla Foundation i počinje razvoj novog web preglednika, koji će uskoro postati poznat pod imenom Firefox. Opera se objavljuje 1996.(rad na njezinom razvoju počeo je još 1994.) i iako unatoč svim svojim kvalitetama ne uspijeva postati popularna(1%), raste joj tržišni udjel među browserima za mobitele. U siječnju 2003. Apple izbacuje Safari, koji pokriva Mac-ovo tržište i malo izvan toga(oko 8%). Zadnji važniji web preglednik koji se pojavio na web pozornici je Google-ov Chrome (rujan 2008.), i dosada je ostvario 1,5 tržišnog udjela. Kronološki razvoj web browsera(koja uključuje i manje poznate preglednike) možete pogledati u tablici Povijesni razvoj web preglednika ispod: Tabela 11"Povijesni razvoj (vaţnijih) web preglednika" Godina Web preglednici 1991. WorldWideWeb 1992. ViolaWWW, Erwise, MidasWWW, MacWWW, Samba(Mac) 1993. Mosaic, Lynx 2.0, Arena, AMosaic 1.0, Cello 1994. IBM Web Explorer, Netscape navigator, SlipKnot 1.0, MacWeb, Ibrowse, Argo, Minuet, Navipress(Mac,PC) 1995. Internet Explorer, Netscape Navigator 2.0, OmniWeb, WebRouser, IE2, Grail 4 1996. Arachne 1.0, IE 3.o, Netscape Navigator 3.0, Opera 2.0, PowerBrowser 1.5, Cyberdog, Amaya 0.9, Aweb, Voyager 1997. IE 4.0, Netscape Navigator 4.0, Netscape Communicator 4.o, Opera 3.0, Amaya 1.0 1998. IE 5.0 Beta, iCab, Mozilla 1999. Amaya 2.0, Mozilla M3, IE 5.0 2000. Konqueror, Netscape 6, Opera 4, Opera 5, K-Meleon 0.2, Amaya 3, Amaya 4 2001. IE
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • Browser Wars
    Uppsala universitet Inst. för informationsvetenskap Browser Wars Kampen om webbläsarmarknaden Andreas Högström, Emil Pettersson Kurs: Examensarbete Nivå: C Termin: VT-10 Datum: 2010-06-07 Handledare: Anneli Edman "Anyone who slaps a 'this page is best viewed with Browser X' label on a Web page appears to be yearning for the bad old days, before the Web, when you had very little chance of read- ing a document written on another computer, another word processor, or another network" - Sir Timothy John Berners-Lee, grundare av World Wide Web Consortium, Technology Review juli 1996 Innehållsförteckning Abstract ...................................................................................................................................... 1 Sammanfattning ......................................................................................................................... 2 1 Inledning .................................................................................................................................. 3 1.1 Bakgrund .............................................................................................................................. 3 1.2 Syfte ..................................................................................................................................... 3 1.3 Frågeställningar .................................................................................................................... 3 1.4 Avgränsningar .....................................................................................................................
    [Show full text]
  • Using Replicated Execution for a More Secure and Reliable Web Browser
    Using Replicated Execution for a More Secure and Reliable Web Browser Hui Xue Nathan Dautenhahn Samuel T. King University of Illinois at Urbana Champaign huixue2, dautenh1, kingst @uiuc.edu { } Abstract Unfortunately, hackers actively exploit these vulnerabil- ities as indicated in reports from the University of Wash- Modern web browsers are complex. They provide a ington [46], Microsoft [61], and Google [49, 48]. high-performance and rich computational environment Both industry and academia have improved the se- for web-based applications, but they are prone to nu- curity and reliability of web browsers. Current com- merous types of security vulnerabilities that attackers modity browsers make large strides towards improving actively exploit. However, because major browser plat- the security and reliability of plugins by using sandbox- forms differ in their implementations they rarely exhibit ing techniques to isolate plugins from the rest of the the same vulnerabilities. browser [62, 33]. However, these browsers still scatter In this paper we present Cocktail, a system that uses security logic throughout millions of lines of code, leav- three different off-the-shelf web browsers in parallel to ing these systems susceptible to browser-based attacks. provide replicated execution for withstanding browser- Current research efforts, like Tahoma [32], the OP web based attacks and improving browser reliability. Cock- browser [36], the Gazelle web browser [59], and the Illi- tail mirrors inputs to each replica and votes on browser nois Browser Operating System [58] all propose build- states and outputs to detect potential attacks, while con- ing new web browsers to improve security. Although tinuing to run.
    [Show full text]
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Using Property-Based Testing, Weighted Grammar-Based Generators and a Consensus Oracle to Test Browser Rendering Engines and To
    USING PROPERTY-BASED TESTING, WEIGHTED GRAMMAR-BASED GENERATORS AND A CONSENSUS ORACLE TO TEST BROWSER RENDERING ENGINES AND TO REPRODUCE MINIMIZED VERSIONS OF EXISTING TEST CASES by JOEL DAVID MARTIN Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY THE UNIVERSITY OF TEXAS AT ARLINGTON December 2019 Supervising Committee: Farhad Kamangar, Supervising Professor David Levine, Supervising Professor Manfred Huber Gergley Zaruba Copyright by Joel David Martin 2019 The copyright of Chapter2 was transferred to the IEEE as part of publication in COMPSAC 2018 (\Property-Based Testing of Browser Rendering Engines with a Consensus Oracle") [1]. Please refer to the IEEE for information about licensing the content from Chapter2. Chapter3 is a manuscript that is intended for separated publication. All copyrights on Chapter3 are currently reserved to Joel Martin. The remainder of this work, excluding Chapter2 and Chapter3, is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. ACKNOWLEDGMENTS Thank you to the members of my Supervising Committee for their support and guidance. In particular, I would like to thank David Levine who spent many long hours with me discussing the research and helping with the numerous large and small details that were necessary to complete my thesis. Many thanks to my employer, Viasat, for the financial investment toward my education. Thank you to my supervisors at Viasat, Ingolf Krueger and Markus Kaltenbach, for their support and encouragement throughout my graduate education. I would like to apologize for the harm done to numerous figurative trees during the completion of this research.
    [Show full text]
  • EDFS 687 Technology Education for Teachers
    EDFS 687 Technology Education for Teachers College of Charleston EDFS 687 Technology Education for Teachers Course Term- Spring, 2010 Credit Hours- 3 Meeting Time and Place: W 4:00-6:45 - ECTR 214 Instructor's Name: Dr. Bob Perkins Office Hours: Tuesday & Thursday 2:00 - 4:30 Office Location: 86 Wentworth St. Office phone/ 953-5699 Fax/ 953-8109 Email: [email protected] Web Page http://perkinsr.people.cofc.edu/classes/EDFS687/ Course Description: This is an introductory course for pre-service and in-service teachers using technology in the classroom. Students become familiar with application software such as word processing, databases and hypermedia, desktop publishing, and telecommunications, and learn to evaluate hardware and software. Course Text/Materials: Required Text: ● Thorsen, T. (2006). TechTactics: Technology for teachers. Boston: Pearson / A. B. Longman. Optional Software: ● Microsoft Office 2003 for Students and Teachers ● SmartTech Notebook software (instructions for downloading are available in WebCT) Other: ● USB Flash Drive; ● access to WebCT & Edisto email account file:///K|/Arachne/classes/EDFS687/EDFS687Perkins.htm (1 of 7)2/1/2010 1:49:38 PM EDFS 687 Technology Education for Teachers Course Objectives: All teacher preparation programs in the School of Education (SOE) are guided by a commitment to Making the Teaching Learning Connection through three Elements of Teacher Competency (ETC) which are at the heart of the SOE Conceptual Framework: ● 1. Understanding and valuing the learner, ● 2. Knowing what and how to teach and asses and how to create environments in which learning occurs, and ● 3. Understanding yourself as a professional. These three competencies underlie all learning objectives in this course, helping the candidate develop the knowledge, skills, and dispositions necessary to become an effective teacher.
    [Show full text]
  • Argovis: a Web Application for Fast Delivery, Visualization, and Analysis of Argo Data
    MARCH 2020 T U C K E R E T A L . 401 Argovis: A Web Application for Fast Delivery, Visualization, and Analysis of Argo Data TYLER TUCKER Department of Atmospheric and Oceanic Sciences, University of Colorado Boulder, Boulder, Colorado, and Department of Mathematics and Statistics, San Diego State University, San Diego, and Scripps Institution of Oceanography, University of California, San Diego, La Jolla, California DONATA GIGLIO Department of Atmospheric and Oceanic Sciences, University of Colorado Boulder, Boulder, Colorado MEGAN SCANDERBEG Scripps Institution of Oceanography, University of California, San Diego, La Jolla, California SAMUEL S. P. SHEN Department of Mathematics and Statistics, San Diego State University, San Diego, California (Manuscript received 18 March 2019, in final form 3 January 2020) ABSTRACT Since the mid-2000s, the Argo oceanographic observational network has provided near-real-time four- dimensional data for the global ocean for the first time in history. Internet (i.e., the ‘‘web’’) applications that handle the more than two million Argo profiles of ocean temperature, salinity, and pressure are an active area of development. This paper introduces a new and efficient interactive Argo data visualization and delivery web application named Argovis that is built on a classic three-tier design consisting of a front end, back end, and database. Together these components allow users to navigate 4D data on a world map of Argo floats, with the option to select a custom region, depth range, and time period. Argovis’s back end sends data to users in a simple format, and the front end quickly renders web-quality figures.
    [Show full text]
  • Freeway Management and Operations Handbook September 2003 (See Revision History Page for Chapter Updates) 6
    FREEWAY MANAGEMENT AND OPERATIONS HANDBOOK FINAL REPORT September 2003 (Updated June 2006) Notice This document is disseminated under the sponsorship of the Department of Transportation in the interest of information exchange. The United States Government assumes no liability for its contents or use thereof. This report does not constitute a standard, specification, or regulation. The United States Government does not endorse products or manufacturers. Trade and manufacturers’ names appear in this report only because they are considered essential to the object of the document. 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. FHWA-OP-04-003 4. Title and Subtitle 5. Report Date Freeway Management and Operations Handbook September 2003 (see Revision History page for chapter updates) 6. Performing Organization Code 7. Author(s) 8. Performing Organization Report No. Louis G. Neudorff, P.E, Jeffrey E. Randall, P.E., Robert Reiss, P..E, Robert Report Gordon, P.E. 9. Performing Organization Name and Address 10. Work Unit No. (TRAIS) Siemens ITS Suite 1900 11. Contract or Grant No. 2 Penn Plaza New York, NY 10121 12. Sponsoring Agency Name and Address 13. Type of Report and Period Covered Office of Transportation Management Research Federal Highway Administration Room 3404 HOTM 400 Seventh Street, S.W. 14. Sponsoring Agency Code Washington D.C., 20590 15. Supplementary Notes Jon Obenberger, FHWA Office of Transportation Management, Contracting Officers Technical Representative (COTR) 16. Abstract This document is the third such handbook for freeway management and operations. It is intended to be an introductory manual – a resource document that provides an overview of the various institutional and technical issues associated with the planning, design, implementation, operation, and management of a freeway network.
    [Show full text]
  • CGI Scripts: Gateways to World-Wide Web Power
    Behavior Research Methods. Instruments. & Computers 1996,28 (2), 165-169 CGI scripts: Gateways to World-Wide Web power JAMES M. KIELEY Miyazaki International CoUege, Miyazaki, Japan The power of the hypertext-based information presentation system known as the World-Wide Web can be enhanced by scripts based on the common gateway interface (CG!) protocol. CG! scripts re­ siding on a Webserver permit the execution of computer programs that can perform a wide variety of functions that maybe useful to psychologists. Example applications are presented here, along with ref­ erence information for potential script developers. The majority ofinformation that people access via the permit users to input data by clicking on checkboxes, hypertext-based information presentation system known radio buttons, menus, reset buttons, and submit buttons, as the World-Wide Web (WWW) is actually stored in the and also by typing into text fields (Lemay, 1995). form of static files-that is, text and graphics files that COl was developed by the original programmers ofthe appear a certain way when viewed from a Web browser, UNIX-based CERN and NCSA HTTP Web servers to such as Netscape or Mosaic, because ofa command lan­ supersede a prior scripting environment called HTBIN. guage known as HTML. HTML, by its original design, is Other Web servers that support scripting, including those a simple command set used to present multimedia infor­ based on other operating systems, mayor may not use mation that can be accessed asynchronously. The capa­ the COl protocol. Early applications of COl scripts in­ bilities ofHTML, and, therefore, the WWW, can be im­ cluded using them to serve information to a browser that proved with scripts conforming to the common gateway is in a format that is otherwise unreadable, such as an SQL interface (COl) protocol.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Web Technologies [R18a0517] Lecture Notes
    WEB TECHNOLOGIES [R18A0517] LECTURE NOTES B.TECH III YEAR – II SEM(R18) (2020-21) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‘A’ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India III Year B. Tech. CSE –II Sem L T/P/D C 4 1/- / - 3 (R18A0517) WEB TECHNOLOGIES Objectives: Giving the students the insights of the Internet programming and how to design and implement complete applications over the web. It covers the notions of Web servers and Web Application Servers, Design Methodologies with concentration on Object-Oriented concepts, Client-Side Programming, Server-Side Programming, Active Server Pages, Database Connectivity to web applications, Adding Dynamic content to web applications, Programming Common Gateway Interfaces, Programming the User Interface for the web applications. UNIT I: Web Basics and Overview: Introduction to Internet, World Wide Web, Web Browsers, URL, MIME, HTTP, Web Programmers Tool box. HTML Common tags: List, Tables, images, forms, frames, Basics of CSS and types of CSS. Client-Side Programming (Java Script): Introduction to Java Script, declaring variables, functions, Event handlers (onclick, onsubmit, etc.,) and Form Validation. UNIT II: Server-Side Programming (PHP): Declaring Variables, Data types, Operators, Control structures, Functions, Reading data from web form controls like text buttons, radio buttons, list, etc., Handling File Uploads, Handling Sessions & Cookies. Introduction to XML: Document type definition, XML Schemas, Document Object model, Presenting XML , Introduction to XHTML, Using XML Processors: DOM and SAX.
    [Show full text]