Mozilla Firefox ESR

Total Page:16

File Type:pdf, Size:1020Kb

Mozilla Firefox ESR Mozilla Firefox ESR Overview Why Firefox ESR? Version History Product Details System Requirements Licensing Information Lab and Classroom Availability Installation Instructions Who To Call Questions, Tips and Tricks Technical Troubleshooting Overview Mozilla Firefox is the recommended Web browser for use on Mac OS X, Windows, and other platforms. Here is an introductory page. Mozilla Firefox ESR (Extended Support Release) is a stable Firefox release which receives the same security updates as the standard version of Firefox but doesn't receive feature updates. It is intended for use by universities, businesses, and others who need extended support for mass deployments. Carleton ITS pushes Firefox ESR and updates through KBox. The current version of Firefox ESR is 10.0.5. For more information, see here. Why Firefox ESR? Firefox ESR was introduced as an option for organizations that were struggling to keep up with the rapid release plan and limited extended support of the standard browser. Additionally, Firefox 10 supports the same addons used at Carleton that were supported in Firefox 3.6 but not necessarily in Firefox 4 through 9. Version History Versions of Firefox through 3.6.18 were introduced slowly, with updates (patches) to change minor versions (e.g., 3.6.33.6.4) and new releases to upgrade to new major versions (e.g., 3.5.x3.6.x). Starting with version 4.0, Mozilla changed this policy, aggressively releasing new major versions for consumers every six weeks, at the same time dropping support for older versions and seldom releasing security patches. On the day each new consumer version is released, the previous consumer version is considered "end-of-life", receiving no more security updates. Because many organizations and software developers struggled with the new rapid release plan, in January of 2012, Mozilla introduced a new update channel, Extended Support Release. The ESR version of Firefox 10, intended for enterprises, reached end-of-life November 20, 2012 (when version 17 ESR is released), and received security updates as minor releases (e.g. 10.0.1, 10.0.2). Every six weeks, when a major new consumer version is released, the ESR version will also receive a minor upgrade for security only, not for new features. At the end of life of version 3.6, Firefox 10 ESR was the new stable release channel, and the one preferred at Carleton. At the end of life of version 10esr, Firefox 17esr was the new stable release channel, and the one preferred at Carleton. At the end of life of version 17esr, on December 10, 2013, Firefox 24esr was the new stable release channel, and the one preferred at Carleton. At the end of life of version 24esr, expected October 14, 2014, Firefox 31esr will be the new stable release channel, and the one preferred at Carleton. We need to draw this distinction between "supported" (3.6.x, then 10.0.x ESR then 17.0.x esr then 24.x.x esr then 31.x.x esr) and "new" (4/5/6/7/8/9/11/12 /13/14/15/16/18/19/...) consumer versions because of compatibility problems. More and more of our enterprise applications are Web-based, using a Web browser as their user interface and launch point. A few applications, most notably AWA (Advance Web Application) and WebCheckout, are sensitive to the Web browser and version. Therefore, ITS is going to provide an ESR replacement for consumer versions of Firefox. Note that earlier versions 2.x, 3.0.x, 3.5.x, and 3.6.x are obsolete, no longer supported and no longer receiving security updates. Product Details Firefox is an open source project of the Mozilla Foundation. The Firefox home page, a starting point for all things Firefox The Mozilla Firefox ESR home page The Firefox 4/5/6/... support home page, a starting point for questions System Requirements Here are the system requirements for these new versions. In general, all you need is a fairly new operating system. Licensing Information As open source software, Firefox is freely distributable for individuals and organizations. Home Use We recommend Firefox for use on home computers. Get it from the Firefox home page or here . Lab and Classroom Availability Firefox is available on all college-owned machines in all labs and classrooms. As of summer 2014, it will be version 31esr. Installation Instructions Labs and Classrooms To request this software be installed on a refreshing lab/classroom contact xxx Link to protected information for how we configured it to work College Owned Equipment Firefox is available through our campus KBOX software distribution system. The Windows versions are visible in the KBOX user portal to all users, who may contact the ITS HelpDesk to get this installed on any college-owned computer. Windows Upgrade (or downgrade) of any version of Firefox to new supported version 31esr: a. From the KBOX user portal, choose "Install Mozilla Firefox 31.x.z", which is the ESR release as the description indicates. b. Firefox should be updated to the very latest 31.x.z ESR version the next time that KBOX patching is run. To update it immediately, login as a Windows Administrator-equivalent and launch Firefox; from the Firefox dropdown menu at the upper left of the browser window, choose HelpAbout Firefox, then choose the Check for Updates button. c. If Firefox advises you to update any plugins (e.g., Java, Adobe Reader, Flash), look for those plugins first in the KBOX user portal list. Most plugins are also updated by KBOX patching. d. Note: This is only for machines with an existing version of Firefox installed, older or newer. For a machine with no version of Firefox installed, from the KBOX Admin UI, find the Managed Install (MI) named "Install anew Firefox 31esr", add this machine to the section titled, "Limit Deployment to Listed Machines", and Save. After the MI runs (which takes a while), remember to return to this MI and remove this machine from the list. If you have the Firefox you want for Windows but are missing the Carleton bookmarks and customizations, copy carleton-cck.xpi from SWARCHIVE\OriginalMedia\Firefox (or maybe find it under C:\ProgramData\Dell\KACE\downloads) to some location on the local machine, then start Firefox and Open (Ctrl-O) that file from where you copied it. When prompted, choose Install, then when offered a chance, choose Restart Firefox. This also works on personal machines running Windows. Link to protected information for ITS instructions Personal Machines Get it from the Firefox home page or here , and install it in the default directory.Use the FileImport command to copy options, bookmarks, history, passwords, and other form data from another Web browser or another Firefox profile. Who To Call The ITS HelpDesk fully supports the use of Firefox on Windows and Mac OS X. The KBOX package for Mac OS X was prepared by Rebecca Barkmeier in Desktop Systems. S.Nissen originally authored the Windows information in this article, but after April 1, 2015, Rebecca Barkmeier will be responsible for the packaging of this application for Windows, so all questions should be directed to her. Questions, Tips and Tricks #1 help tip: You just upgraded to Firefox 4/5/6/7/8/9/10/11/12/13/14/..., and you don't see the toolbars you used to see. To get them back on Windows, press an Alt key, which will display the menu bar, from which you can choose ViewToolbars to turn any of the toolbars on or off. (You can also move the Tabs toolbar down from the top using ViewToolbarsTabs on Top.) To get back more 3.6-like features, see the extensions discussed here . For a visual guide to the changes between version 3.6.* and 10 ESR, see this article. #2 help tip: NEW: You just upgraded to Firefox 31 or later (from a version before 29), and you hate the new Australis user interface which lacks the orange Firefox menu button in the title bar at the upper left. You can get back that menu button, as well as other pre-Australis features, by installing and configuring the extension "Classic Theme Restorer", available from here. Note that ITS does not support this extension or provide it on public lab computers. But the new triple dash menu button () toward the right end of the toolbar offers some of the features you may be missing. Click-to-Play NEW: Firefox 10 esr implemented a new feature called the blocklist: Firefox contacts Mozilla (about once a day) to see if any of its installed plugins (like Flash, Java, Adobe Reader) are on the blocklist, and if so, disables them. The blocklist is a list of specific plugin versions that are no longer current and known to be vulnerable to security exploits. Firefox 17 esr changes that with a new prompt they call "Click-To-Play": if a plug-in is on the blocklist but it gets invoked by a Web page, Firefox will prompt the user whether they want to load the unsafe plugin anyway. You can read more about how Click-to-Play works, or what to do when you are prompted. Firefox and Java (JRE) As more and more Java exploits have been discovered, the makers of Firefox, Mozilla, have made it more and more difficult to run Java in Firefox at all. Starting with Firefox versions 24 and 24esr, every version of Java, even the very latest version, may be blocked, and there may be no "Click-To-Play" prompt to get around the block. The only workaround for a user is to enable Java for a particular Web site, using these instructions: https://support.mozilla.
Recommended publications
  • Install and Configure Cisco Anyconnect VPN
    Install and Configure Cisco AnyConnect VPN PURPOSE: • Installing and configuring Cisco AnyConnect • Enabling and Disabling Cisco AnyConnect VERSION SUPPORTED: 4.5.02033 HOW TO INSTALL AND CONFIGURE CISCO ANYCONNECT VPN FOR WINDOWS: From the desktop, open up a web browser (Google Chrome, Mozilla Firefox, Microsoft Edge, or Internet Explorer). Note: Google Chrome will be used in this example. Type in vpn01.cu.edu into the address bar. You will reach a login page, login using your CU System Username and Password. Contact UIS Call: 303-860-4357 Email:[email protected] Click on the AnyConnect button on the bottom of the list on the left-hand side. Select the “Start AnyConnect” button on that page. It will then load a few items, after it finishes click the blue link for “AnyConnect VPN” Contact UIS Call: 303-860-4357 Email:[email protected] This will download the client in the web browser, in Google Chrome this shows up on the bottom section of the page, but other browsers may place the download in a different location. If you cannot find the download, it should go to the Downloads folder within Windows. Contact UIS Call: 303-860-4357 Email:[email protected] We will then run this download by clicking on it in Chrome. Other browsers may offer a “Run” option instead, which acts the same. It will then open up an installer. Click “Next.” Select the “I accept the terms in the License Agreement” button. Click “Next.” Contact UIS Call: 303-860-4357 Email:[email protected] Select “Install”, this will require the username and password you use to login to your personal computer.
    [Show full text]
  • Machine Learning in the Browser
    Machine Learning in the Browser The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:38811507 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Machine Learning in the Browser a thesis presented by Tomas Reimers to The Department of Computer Science in partial fulfillment of the requirements for the degree of Bachelor of Arts in the subject of Computer Science Harvard University Cambridge, Massachusetts March 2017 Contents 1 Introduction 3 1.1 Background . .3 1.2 Motivation . .4 1.2.1 Privacy . .4 1.2.2 Unavailable Server . .4 1.2.3 Simple, Self-Contained Demos . .5 1.3 Challenges . .5 1.3.1 Performance . .5 1.3.2 Poor Generality . .7 1.3.3 Manual Implementation in JavaScript . .7 2 The TensorFlow Architecture 7 2.1 TensorFlow's API . .7 2.2 TensorFlow's Implementation . .9 2.3 Portability . .9 3 Compiling TensorFlow into JavaScript 10 3.1 Motivation to Compile . 10 3.2 Background on Emscripten . 10 3.2.1 Build Process . 12 3.2.2 Dependencies . 12 3.2.3 Bitness Assumptions . 13 3.2.4 Concurrency Model . 13 3.3 Experiences . 14 4 Results 15 4.1 Benchmarks . 15 4.2 Library Size . 16 4.3 WebAssembly . 17 5 Developer Experience 17 5.1 Universal Graph Runner .
    [Show full text]
  • Replication: Why We Still Can't Browse in Peace
    Replication: Why We Still Can’t Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories Sarah Bird, Ilana Segall, and Martin Lopatka, Mozilla https://www.usenix.org/conference/soups2020/presentation/bird This paper is included in the Proceedings of the Sixteenth Symposium on Usable Privacy and Security. August 10–11, 2020 978-1-939133-16-8 Open access to the Proceedings of the Sixteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Replication: Why We Still Can’t Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories Sarah Bird Ilana Segall Martin Lopatka Mozilla Mozilla Mozilla Abstract This work seeks to reproduce the findings of Olejnik, Castel- We examine the threat to individuals’ privacy based on the luccia, and Janc [48] regarding the leakage of private infor- feasibility of reidentifying users through distinctive profiles mation when users browse the web. The reach of large-scale of their browsing history visible to websites and third par- providers of analytics and advertisement services into the ties. This work replicates and extends the 2012 paper Why overall set of web properties shows a continued increase in Johnny Can’t Browse in Peace: On the Uniqueness of Web visibility [64] by such parties across a plurality of web prop- Browsing History Patterns [48]. The original work demon- erties. This makes the threat of history-based profiling even strated that browsing profiles are highly distinctive and stable. more tangible and urgent now than when originally proposed. We reproduce those results and extend the original work to detail the privacy risk posed by the aggregation of browsing 2 Background and related work histories.
    [Show full text]
  • Browser Versions Carry 10.5 Bits of Identifying Information on Average [Forthcoming Blog Post]
    Browser versions carry 10.5 bits of identifying information on average [forthcoming blog post] Technical Analysis by Peter Eckersley This is part 3 of a series of posts on user tracking on the modern web. You can also read part 1 and part 2. Whenever you visit a web page, your browser sends a "User Agent" header to the website saying what precise operating system and browser you are using. We recently ran an experiment to see to what extent this information could be used to track people (for instance, if someone deletes their browser cookies, would the User Agent, alone or in combination with some other detail, be enough to re-create their old cookie?). Our experiment to date has shown that the browser User Agent string usually carries 5-15 bits of identifying information (about 10.5 bits on average). That means that on average, only one person in about 1,500 (210.5) will have the same User Agent as you. On its own, that isn't enough to recreate cookies and track people perfectly, but in combination with another detail like an IP address, geolocation to a particular ZIP code, or having an uncommon browser plugin installed, the User Agent string becomes a real privacy problem. User Agents: An Example of Browser Characteristics Doubling As Tracking Tools When we analyse the privacy of web users, we usually focus on user accounts, cookies, and IP addresses, because those are the usual means by which a request to a web server can be associated with other requests and/or linked back to an individual human being, computer, or local network.
    [Show full text]
  • Netscape 6.2.3 Software for Solaris Operating Environment
    What’s New in Netscape 6.2 Netscape 6.2 builds on the successful release of Netscape 6.1 and allows you to do more online with power, efficiency and safety. New is this release are: Support for the latest operating systems ¨ BETTER INTEGRATION WITH WINDOWS XP q Netscape 6.2 is now only one click away within the Windows XP Start menu if you choose Netscape as your default browser and mail applications. Also, you can view the number of incoming email messages you have from your Windows XP login screen. ¨ FULL SUPPORT FOR MACINTOSH OS X Other enhancements Netscape 6.2 offers a more seamless experience between Netscape Mail and other applications on the Windows platform. For example, you can now easily send documents from within Microsoft Word, Excel or Power Point without leaving that application. Simply choose File, “Send To” to invoke the Netscape Mail client to send the document. What follows is a more comprehensive list of the enhancements delivered in Netscape 6.1 CONFIDENTIAL UNTIL AUGUST 8, 2001 Netscape 6.1 Highlights PR Contact: Catherine Corre – (650) 937-4046 CONFIDENTIAL UNTIL AUGUST 8, 2001 Netscape Communications Corporation ("Netscape") and its licensors retain all ownership rights to this document (the "Document"). Use of the Document is governed by applicable copyright law. Netscape may revise this Document from time to time without notice. THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL NETSCAPE BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING FROM ANY ERROR IN THIS DOCUMENT, INCLUDING WITHOUT LIMITATION ANY LOSS OR INTERRUPTION OF BUSINESS, PROFITS, USE OR DATA.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Marcia Knous: My Name Is Marcia Knous
    Olivia Ryan: Can you just state your name? Marcia Knous: My name is Marcia Knous. OR: Just give us your general background. How did you come to work at Mozilla and what do you do for Mozilla now? MK: Basically, I started with Mozilla back in the Netscape days. I started working with Mozilla.org shortly after AOL acquired Netscape which I believe was in like the ’99- 2000 timeframe. I started working at Netscape and then in one capacity in HR shortly after I moved working with Mitchell as part of my shared responsibility, I worked for Mozilla.org and sustaining engineering to sustain the communicator legacy code so I supported them administratively. That’s basically what I did for Mozilla. I did a lot of I guess what you kind of call of blue activities where we have a process whereby people get access to our CVS repository so I was the gatekeeper for all the CVS forms and handle all the bugs that were related to CVS requests, that kind of thing. Right now at Mozilla, I do quality assurance and I run both our domestic online store as well as our international store where we sell all of our Mozilla gear. Tom Scheinfeldt: Are you working generally alone in small groups? In large groups? How do you relate to other people working on the project? MK: Well, it’s a rather interesting project. My capacity as a QA person, we basically relate with the community quite a bit because we have a very small internal QA organization.
    [Show full text]
  • How-To Gnome-Look Guide
    HHOOWW--TTOO Written by David D Lowe GGNNOOMMEE--LLOOOOKK GGUUIIDDEE hen I first joined the harddisk, say, ~/Pictures/Wallpapers. right-clicking on your desktop Ubuntu community, I and selecting the appropriate You may have noticed that gnome- button (you know which one!). Wwas extremely look.org separates wallpapers into impressed with the amount of different categories, according to the customization Ubuntu had to size of the wallpaper in pixels. For Don't let acronyms intimidate offer. People posted impressive the best quality, you want this to you; you don't have to know screenshots, and mentioned the match your screen resolution. If you what the letters stand for to themes they were using. They don't know what your screen know what it is. Basically, GTK is soon led me to gnome-look.org, resolution is, click System > the system GNOME uses to the number one place for GNOME Preferences > Screen Resolution. display things like buttons and visual customization. The However, Ubuntu stretches controls. GNOME is Ubuntu's screenshots there looked just as wallpapers quite nicely if you picked default desktop environment. I impressive, but I was very the wrong size, so you needn't fret will only be dealing with GNOME confused as to what the headings about it. on the sidebar meant, and I had customization here--sorry no idea how to use the files I SVG is a special image format that Kubuntu and Xubuntu folks! downloaded. Hopefully, this guide doesn't use pixels; it uses shapes Gnome-look.org distinguishes will help you learn what I found called vectors, which means you can between two versions of GTK: out the slow way.
    [Show full text]
  • Peer Participation and Software
    Peer Participation and Software This report was made possible by the grants from the John D. and Cath- erine T. MacArthur Foundation in connection with its grant-making initiative on Digital Media and Learning. For more information on the initiative visit www.macfound.org. The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning Peer Participation and Software: What Mozilla Has to Teach Government by David R. Booth The Future of Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones The Future of Thinking: Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones New Digital Media and Learning as an Emerging Area and “Worked Examples” as One Way Forward by James Paul Gee Living and Learning with New Media: Summary of Findings from the Digital Youth Project by Mizuko Ito, Heather Horst, Matteo Bittanti, danah boyd, Becky Herr-Stephenson, Patricia G. Lange, C. J. Pascoe, and Laura Robinson with Sonja Baumer, Rachel Cody, Dilan Mahendran, Katynka Z. Martínez, Dan Perkel, Christo Sims, and Lisa Tripp Young People, Ethics, and the New Digital Media: A Synthesis from the GoodPlay Project by Carrie James with Katie Davis, Andrea Flores, John M. Francis, Lindsay Pettingill, Margaret Rundle, and Howard Gardner Confronting the Challenges of Participatory Culture: Media Education for the 21st Century by Henry Jenkins (P.I.) with Ravi Purushotma, Margaret Weigel, Katie Clinton, and Alice J. Robison The Civic Potential of Video Games by Joseph Kahne, Ellen Middaugh, and Chris Evans Peer Production and Software What Mozilla Has to Teach Government David R.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Enabling TLS 1.2 in Major Browsers
    Enabling TLS 1.2 in Major Browsers Table of Contents Updating Microsoft Internet Explorer ...................................................................................................................................................... 2 Enabling or Disabling TLS Protocols in Internet Explorer .................................................................................................................... 2 Updating Mozilla Firefox ........................................................................................................................................................................... 3 Enabling or Disabling TLS Protocols in Firefox .................................................................................................................................... 4 Updating Google Chrome ......................................................................................................................................................................... 5 Enabling or Disabling TLS Protocols in Chrome .................................................................................................................................. 5 Updating Apple Safari ............................................................................................................................................................................... 7 Enabling or Disabling TLS Protocols in Apple Safari ............................................................................................................................ 7 Appendix
    [Show full text]
  • Development Production Line the Short Story
    Development Production Line The Short Story Jene Jasper Copyright © 2007-2018 freedumbytes.dev.net (Free Dumb Bytes) Published 3 July 2018 4.0-beta Edition While every precaution has been taken in the preparation of this installation manual, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To get an idea of the Development Production Line take a look at the following Application Integration overview and Maven vs SonarQube Quality Assurance reports comparison. 1. Operating System ......................................................................................................... 1 1.1. Windows ........................................................................................................... 1 1.1.1. Resources ................................................................................................ 1 1.1.2. Desktop .................................................................................................. 1 1.1.3. Explorer .................................................................................................. 1 1.1.4. Windows 7 Start Menu ................................................................................ 2 1.1.5. Task Manager replacement ........................................................................... 3 1.1.6. Resource Monitor .....................................................................................
    [Show full text]