Security Features in Outlook Express L^

Total Page:16

File Type:pdf, Size:1020Kb

Security Features in Outlook Express L^ Overview | Security Zones | Digital IDs | Secure E-mail Security Features in Outlook Express L^ Overview As the use of e-mail and electronic commerce becomes more widely adopted, the amount of confidential information being exchanged overthe Internet is growing rapidly. As a result, there is a need to make e-mail messages more secure and private. In addition, with the growing popularity of ActiveX controls, scripts and Java applets, there is an increased chance that the HTML in i I i-niilrl tAfil-hniit" Outlook Express includes tools to help protect you from fraud, help increase your electronic privacy, and help reduce the risk of unauthorized access to your computer. These tools enable you to send and receive secure e-mail more securely and to control Ga^iiril-w 7i"tn Internet Explorer 4.o's security zones are like visas that some countries issue to travelers. If the country trusts you, it X stamps passport so can travel anywhere like during visit. If for some reason the country doesn't Security zones work the same way, except that you control how much access e-mail messages and web pages have to your Security zones provide advanced protection your and yourprivacy without interrupting you with repeated Outlook Express enables you to choose which zone your incoming e-mail is in -- either the Internet zone or the Restricted Sites zone. Which zone you select depends on how concerned you are about active content (e.g. ActiveX controls, scripts and Java annlphO wpinhprl snsin^f fhp frppHnm fn t-hsf rnntenf rnmnufpr. Tn sHHiHnn. fnr psrh rhnn^p To change your security zones settings for Outlook Express, click the Tools menu, click Options and then click the Security tab. Digital IDs To use secure e-mail in Outlook Express, you need a digital ID. Digital IDs (also called certificates) provide a meansfor proving your identity on the Internet, similar to the way a driver's license or other ID cards identify people on a daily basis. yuur lueriuiy lv liik way i> vi iv luenuiy peupie udiiy Digital IDs allow to sign so that the intended recipients can make sure that the actually came from ;c aigicai iv in uuck ucLLiiiy a L/iyiLdi iv You obtain diaital ID from certifvina authority, oraanization resDonsible for issuina diaital IDs and send you encrypted messages, and you can use the same digital ID for sending signed messages. VeriSign, Inc. is the first commercial certifying authority and Microsoft's preferred provider of digital IDs. I Evnln.-=.- A I X when you send secure e-mail. To take Using your Digital ID rnnfanf i-nmniil-or mricarii- x/nii rarai\/a n a_ m rrtacc^na r\r mnrlifx/ filac nn i/nnr unnr l/nni*florlnQ r\r ac your you you your computer. for computer run nn vnur 7nnp. vnu ran 3 un Liie inmiimi., bimiidr d uriver iiLenbe uliibi Ldrui. un d udbib. you your e-mail, message you scacus or a cne your a an Tkmunk ,-iT>l nffor fi-nm \/=.-iCinn Mir<>-nf<nfl- TnMrnsf fl nk(-T>in fra hr\ n=rc-nnTil n " = ursrr r^n n = n messages, and then click Digital ID. Select the digital ID you want to associate with this account (only the digital IDs with the same e-mail address as the e-mail address for the account will be shown). Backing up your Digital ID Part of your digital ID is an irreplaceableprivate key that is stored on your computer. If the private key is lost, you will no longer be able to send signed mail or read encrypted mail with that digital ID. You are strongly encouraged to make a backup ofyour digital ID in case the files containing the digital ID are damaged or otherwise unreadable. To back up your digital ID, run Internet Explorer, click the View menu, and then click Internet Options. Click the rnntpnf tsh ar\H thpn rlirk thp Pprcnnal hnttnn Thp Imnnrt ar\H Fvnnrt hnttnnc thk sllnw tn Lonieni caD vniirHinital THe Caj"ii PA E_rtt Sll Now that you have a digital ID, you can send secure e-mail. Secure e-mail in Outlook Express protects your Internet communications in two ways: through digital signatures and encryption. Using digital signatures, you can sign your e-mail message with a unique ID that assures the person receiving the message that you are the true sender of the message, and that it was not tampered with in transit. Encrypting e-mail that you send can help ensure that no one except the intended recipient can read the Because Outlook Express uses the S/MIME standard, other people can read secure e-mail that you compose, using programs that support this technology. Likewise, can read composed by otherpeople by using e-mail that support Sending signed mail. Signed e-mail allows an e-mail recipient to verify your identity. To digitally sign an e-mail x message, click the Tools and then click Digitally Sign (or use the button on the message toolbar). To send signed mail, you must have a digital ID of your own (see above). Receiving signed mail. Signed e-mail from others allows you to verify the authenticity of a message — that the message is from the supposed sender and the message has not been tampered with during transit. Signed e-mail messages are rlpcinnatprl with cnprial cinnprl p-mail irnnc nrnhlpmc frlpcrrihprl in Dntlnnlc warninncl with cinnprl mail that you receive could indicate that the message has been tampered with or was not from the supposed sender. Sending encrypted mail. Encrypting an e-mail message prevents other people from reading it when it is in transit. To encrypt an e-mail message, you need the digital ID of the person you are sending the e-mail to. The digital ID must be part nf 4-k= n-.-.-nn'r- l 4-k= An Tn -iI 4-k= T««lc -„n r, o the button on the message toolbar). Receiving encrypted mail. When you receive an encrypted e-mail message, you can be reasonably confident that the me;>;>dye uy dnyune express. dULurndLit-diiy umiy^Lb iTiebbdyeb, [jruviueu yuu have the correct digital ID installed on your computer. Sending your digital ID to others. For others to be able to send you encrypted mail, they need your digital ID. To send it to tnem, simply sena tnem digitallysigned e-mail (.see aDovej and uutiooK win automatically include your digital ID. Retrieving others' digital IDs. To send others encrypted mail, you need their digital ID. Outlook Express is the first e- mail program to allow you to retrieve digital IDs via directory services. To find a digital ID, click the Edit menu, and then click Find People. Select a directory service that has digital IDs (such as the VeriSign directory service), enter the recipient's name or e-mail address in the appropriate search and then click Find. Select a listing from the results pane and then click Add to Address Book. (Another way to get someone else's digital ID is to have that person send you signed mail. To add the digital ID a piece signed mail to yourAddress click the File menu and click Properties. on the Security tab and click the Add Digital ID to Address Book button.) Changing trust status on digital IDs. When you add someone's digital ID to your address book, it has a trust status associated with it which indicates whetheryou trust the individual, group, or corporation to whom the digital ID was issued. If diaital ID that he she susoeets that the diaital ID's orivate key has been eomrjromised. nr\ r\an& vnu ana men cm mansna you messages programs menu, Any FYnrpcc cprnritv p- = (-.-„ n n .-n^r- s^l/ r-nnn = ,-.-„ n(-=n m ,-li,.|, m =n.. 4-k=„ ,-li,-l, C^.-.. n » ( .- = rid;> mul ueen redu ei&e. uuliuuk e-mdii LiidL txpress field, from of Book, Click a owner warns you or you may.
Recommended publications
  • Interaction Between Web Browsers and Script Engines
    IT 12 058 Examensarbete 45 hp November 2012 Interaction between web browsers and script engines Xiaoyu Zhuang Institutionen för informationsteknologi Department of Information Technology Abstract Interaction between web browser and the script engine Xiaoyu Zhuang Teknisk- naturvetenskaplig fakultet UTH-enheten Web browser plays an important part of internet experience and JavaScript is the most popular programming language as a client side script to build an active and Besöksadress: advance end user experience. The script engine which executes JavaScript needs to Ångströmlaboratoriet Lägerhyddsvägen 1 interact with web browser to get access to its DOM elements and other host objects. Hus 4, Plan 0 Browser from host side needs to initialize the script engine and dispatch script source code to the engine side. Postadress: This thesis studies the interaction between the script engine and its host browser. Box 536 751 21 Uppsala The shell where the engine address to make calls towards outside is called hosting layer. This report mainly discussed what operations could appear in this layer and Telefon: designed testing cases to validate if the browser is robust and reliable regarding 018 – 471 30 03 hosting operations. Telefax: 018 – 471 30 00 Hemsida: http://www.teknat.uu.se/student Handledare: Elena Boris Ämnesgranskare: Justin Pearson Examinator: Lisa Kaati IT 12 058 Tryckt av: Reprocentralen ITC Contents 1. Introduction................................................................................................................................
    [Show full text]
  • Scala Infochannel Player Setup Guide
    SETUP GUIDE P/N: D40E04-01 Copyright © 1993-2002 Scala, Inc. All rights reserved. No part of this publication, nor any parts of this package, may be copied or distributed, transmitted, transcribed, recorded, photocopied, stored in a retrieval system, or translated into any human or computer language, in any form or by any means, electronic, mechanical, magnetic, manual, or otherwise, or disclosed to third parties without the prior written permission of Scala Incorporated. TRADEMARKS Scala, the exclamation point logo, and InfoChannel are registered trademarks of Scala, Inc. All other trademarks or registered trademarks are the sole property of their respective companies. The following are trademarks or registered trademarks of the companies listed, in the United States and other countries: Microsoft, MS-DOS, Windows, Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, DirectX, DirectDraw, DirectSound, ActiveX, ActiveMovie, Internet Explorer, Outlook Express: Microsoft Corporation IBM, IBM-PC: International Business Machines Corporation Intel, Pentium, Indeo: Intel Corporation Adobe, the Adobe logo, Adobe Type Manager, Acrobat, ATM, PostScript: Adobe Systems Incorporated TrueType, QuickTime, Macintosh: Apple Computer, Incorporated Agfa: Agfa-Gevaert AG, Agfa Division, Bayer Corporation “Segoe” is a trademark of Agfa Monotype Corporation. “Flash” and “Folio” are trademarks of Bauer Types S.A. Some parts are derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. JPEG file handling is based in part on the work of the Independent JPEG Group. Lexsaurus Speller Technology Copyright © 1992, 1997 by Lexsaurus Software Inc. All rights reserved. TIFF-LZW and/or GIF-LZW: Licensed under Unisys Corporation US Patent No. 4,558,302; End-User use restricted to use on only a single personal computer or workstation which is not used as a server.
    [Show full text]
  • How to Change Your Browser Preferences So It Uses Acrobat Or Reader PDF Viewer
    How to change your browser preferences so it uses Acrobat or Reader PDF viewer. If you are unable to open the PDF version of the Emergency Action Plan, please use the instructions below to configure your settings for Firefox, Google Chrome, Apple Safari, Internet Explorer, and Microsoft Edge. Firefox on Windows 1. Choose Tools > Add-ons. 2. In the Add-ons Manager window, click the Plugins tab, then select Adobe Acrobat or Adobe Reader. 3. Choose an appropriate option in the drop-down list next to the name of the plug-in. 4. Always Activate sets the plug-in to open PDFs in the browser. 5. Ask to Activate prompts you to turn on the plug-in while opening PDFs in the browser. 6. Never Activate turns off the plug-in so it does not open PDFs in the browser. Select the Acrobat or Reader plugin in the Add-ons Manager. Firefox on Mac OS 1. Select Firefox. 2. Choose Preferences > Applications. 3. Select a relevant content type from the Content Type column. 4. Associate the content type with the application to open the PDF. For example, to use the Acrobat plug-in within the browser, choose Use Adobe Acrobat NPAPI Plug-in. Reviewed 2018 How to change your browser preferences so it uses Acrobat or Reader PDF viewer. Chrome 1. Open Chrome and select the three dots near the address bar 2. Click on Settings 3. Expand the Advanced settings menu at the bottom of the page 4. Under the Privacy and security, click on Content Settings 5. Find PDF documents and click on the arrow to expand the menu 6.
    [Show full text]
  • How to Check Your Browser Version on a PC
    How to Check Your Browser Version on a PC Google Chrome (PC) 1) Click on the Menu Icon ( ) in the upper right corner of your browser window. 2) Click on Settings 3) Click on the About tab on the left-hand side of the page. 4) If you are not running the most recent version of Chrome available for your Operating System, you will be prompted to update Chrome. For your security, we recommend that you install all Security, App and Operating System updates as they become available. Mozilla Firefox (PC) 1) Click on the Help menu at the top of your browser window. 2) Click on About Firefox at the bottom of the menu. 3) A small window will pop up showing your Firefox version number, and will tell you whether you are on the most recent version, or not. For your security, we recommend that you install all Security, App and Operating System updates as they become available. Internet Explorer (PC) 1) Click on the Gear Icon at the top of your browser window. 2) Click on the About Internet Explorer option. 3) A window will pop up showing you your Internet Explorer version. 4) If you are using Internet Explorer 9 or 10, you will need to make sure that you have TLS 1.2 enabled by: A) Clicking on the Gear Icon again. B) Click on Internet Options. C) Click on the Advanced Tab and scroll down to the option titled “Use TLS 1.2”. (This should be found at the bottome of the list of options.) The box next to this should be checked.
    [Show full text]
  • Write Once, Pwn Anywhere
    Write Once, Pwn Anywhere Yang Yu Twitter: @tombkeeper Agenda • Summon BSTR back • JScript 9 mojo • “Vital Point Strike” • “Interdimensional Execution” Who am I? • From Beijing, China • Director of Xuanwu Security Lab at Tencent – We're hiring • Researcher from 2002, geek from birth – Strong focus on exploiting and detection • Before 2002, I am a… Before 2002 Now Summon BSTR back About BSTR JScript 5.8 and earlier use BSTR to store String object data struct BSTR { LONG length; WCHAR* str; } var str = “AAAAAAAA”; 0:016> dc 120d0020 l 8 120d0020 00000010 00410041 00410041 00410041 ....A.A.A.A.A.A. 120d0030 00410041 00000000 00000000 00000000 A.A............. Corrupt BSTR prefix var str = “AAAAAAAA”; 0:016> dc 120d0020 l 4 120d0020 00000010 00410041 00410041 00410041 ....A.A.A.A.A.A. writeByVul(0x120d0020, 0x7ffffff0); 0:016> dc 120d0020 l 4 120d0020 7ffffff0 00410041 00410041 00410041 ....A.A.A.A.A.A. var outofbounds = str.substr(0x22222200,4); * Peter Vreugdenhil, “Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit” Locate the address of BSTR prefix var strArr = heapSpray("\u0000"); var sprayedAddr = 0x14141414; writeByVul(sprayedAddr); for (i = 0; i < strArr.length; i++) { p = strArr[i].search(/[^\u0000]/); if (p != -1) { modified = i; leverageStr = strArr[modified]; bstrPrefixAddr = sprayedAddr - (p)*2 - 4; break; } } * Fermin J. Serna, “The info leak era on software exploitation” JScript 9 replaced JScript 5.8 since IE 9 JScript 9 does not use BSTR now So exploiters switch to flash vector object But, JScript 5.8 is still there We can summon it back The spell to summon JScript 5.8 back <META http-equiv = "X-UA-Compatible" content = "IE=EmulateIE8"/> <Script Language = "JScript.Encode"> … </Script> or <META http-equiv = "X-UA-Compatible" content = "IE=EmulateIE8"/> <Script Language = "JScript.Compact"> … </Script> * Some features are not supported with JScript.Compact, like eval().
    [Show full text]
  • Case Study: Internet Explorer 1994..1997
    Case Study: Internet Explorer 1994..1997 Ben Slivka General Manager Windows UI [email protected] Internet Explorer Chronology 8/94 IE effort begins 12/94 License Spyglass Mosaic source code 7/95 IE 1.0 ships as Windows 95 feature 11/95 IE 2.0 ships 3/96 MS Professional Developer’s Conference AOL deal, Java license announced 8/96 IE 3.0 ships, wins all but PC Mag review 9/97 IE 4.0 ships, wins all the reviews IE Feature Chronology IE 1.0 (7/14/95) IE 2.0 (11/17/95) HTML 2.0 HTML Tables, other NS enhancements HTML <font face=> Cell background colors & images Progressive Rendering HTTP cookies (arthurbi) Windows Integration SSL Start.Run HTML (MS enhancements) Internet Shortcuts <marquee> Password Caching background sounds Auto Connect, in-line AVIs Disconnect Active VRML 1.0 Navigator parity MS innovation Feature Chronology - continued IE 3.0 (8/12/96) IE 3.0 - continued... IE 4.0 (9/12/97) Java Accessibility Dynamic HTML (W3C) HTML Frames PICS (W3C) Data Binding Floating frames HTML CSS (W3C) 2D positioning Componentized HTML <object> (W3C) Java JDK 1.1 ActiveX Scripting ActiveX Controls Explorer Bars JavaScript Code Download Active Setup VBScript Code Signing Active Channels MSHTML, SHDOCVW IEAK (corporations) CDF (XML) WININET, URLMON Internet Setup Wizard Security Zones DocObj hosting Referral Server Windows Integration Single Explorer ActiveDesktop™ Navigator parity MS innovation Quick Launch, … Wins for IE • Quality • CoolBar, Explorer Bars • Componetization • Great Mail/News Client • ActiveX Controls – Outlook Express – vs. Nav plug-ins
    [Show full text]
  • Internet Explorer Users Are Required to Add the Portal URL to Trusted Sites
    CLA Client Portal Browser and Silverlight FAQs 1. Question: I am receiving an “Error 500” when clicking the link to access the CLA Document Portal. Resolution: Verify with your IT department that the portal is not blocked by any internal monitoring or protection applications. 2. Question: How do I know if my computer has Microsoft Silverlight Installed? Resolution: The first time you try and login to the portal you will be prompted to install Silverlight from Microsoft’s website if you don’t have it already installed. The installation typically takes less than one minute and is completely safe. http://www.microsoft.com/getsilverlight/Get-Started/Install/Default.aspx If you cannot, or prefer not to, install Silverlight on your machine, a simplified version of the document portal that does not require Silverlight is available. Click on the Take me to the non- Silverlight login on the CLA Document Portal page (www.claconnect.com/docportal). 3. Question: I cannot access the CLA Document Portal. (Server error/Page not found) Resolution: Check that you are using a Microsoft Silverlight 4 compatible browser on all PC’s or MAC. A complete list of browsers and operating systems that support Silverlight 4 can be found at http://www.microsoft.com/getsilverlight/locale/en-us/html/installation-win-SL4.html Please note: Internet Explorer users are required to add the portal URL to Trusted Sites. Adding to Trusted Sites Internet Explorer settings 1. Open Internet Explorer and browse to https://portal.cchaxcess.com/Portal/. 2. In Internet Explorer, select Tools / Internet Options; then select the Security tab and click Trusted Sites and then Sites.
    [Show full text]
  • How to Use Rules in Outlook and Outlook Express to Forward Email
    How to use rules in Outlook and Outlook Express to forward email. In Outlook Express (6) 1. Click on the Tools menu and select Options. 2. In options select the Send tab. 3. Make sure the settings for Mail Sending Format has the Plain Text radio button selected. 4. Then click the Plain Text Settings button. 5. Leave the Message format on “MIME”. 6. Uncheck the box at the bottom that says “Indent the original text with…”. 7. Click OK. 8. Now click on the Signatures tab. 9. Make sure if you have a signature(s) listed that the box labeled “Don’t add signatures to Replies and Forwards” is checked. Then click OK. 10. Click on the Tools menu and select Message Rules, and then select Mail. 11. Click on the Mail Rules tab. 12. Click the New Button. 13. In the area labeled 1. Select the Conditions for your rule: Select the box next to Where the Subject line contains specific words (in this example we will use the subject but you could use account or email address if desired). 14. Then in the area labeled 2. Select the Actions for your rule: Select the box next to Forward it to people. 15. In the area labeled 3. Rule Description… click on the blue link that says “contains specific words” then type your member code in the box and click on the Add Button and then click OK. 16. Then in the same area click on the blue link that says “people”, then type in the email address of where you want the email to automatically forward to and then click OK.
    [Show full text]
  • Planning for Internet Explorer and the IEAK
    02_Inst.fm Page 15 Monday, October 16, 2000 9:40 AM TWO 2Chapter 2 Planning for Internet Explorer and the IEAK LChapter Syllabus In this chapter, we will look at material covered in the Planning section of Microsoft’s Implementing MCSE 2.1 Addressing Technical Needs, Rules, and Policies and Supporting Microsoft Internet Explorer 5 by using the Internet Explorer Administration Kit exam MCSE 2.2 Planning for Custom (70-080). After reading this chapter, you should be Installations and Settings able to: MCSE 2.3 Providing Multiple • Identify and evaluate the technical needs of business Language Support units, such as Internet Service Providers (ISPs), con- tent providers, and corporate administrators. MCSE 2.4 Providing Multiple Platform Support • Design solutions based on organizational rules and policies for ISPs, content providers, and corporate MCSE 2.5 Developing Security Strategies administrators. • Evaluate which components to include in a custom- MCSE 2.6 Configuring for Offline ized Internet Explorer installation package for a given Viewing deployment scenario. MCSE 2.7 Replacing Other Browsers • Develop appropriate security strategies for using Internet Explorer at various sites, including public MCSE 2.8 Developing CMAK kiosks, general business sites, single-task-based sites, Strategies and intranet-only sites. 15 02_Inst.fm Page 16 Monday, October 16, 2000 9:40 AM 16 Chapter 2 • Planning for Internet Explorer and the IEAK • Configure offline viewing for various types of users, including gen- eral business users, single-task users, and mobile users. • Develop strategies for replacing other Internet browsers, such as Netscape Navigator and previous versions of Internet Explorer. • Decide which custom settings to configure for Microsoft Outlook Express for a given scenario.
    [Show full text]
  • Getting Started with Outlook Express for Windows 2000/XP Author Marcie Matsuo Revised by Darren Kato
    WIN9X015 November 2005 Getting Started With Outlook Express For Windows 2000/XP Author Marcie Matsuo Revised by Darren Kato Introduction.................................................................................................................................1 What is Outlook Express ............................................................................................................1 Requirements ..............................................................................................................................2 Where do I get Outlook Express.................................................................................................2 Issues...........................................................................................................................................2 POP and IMAP ...........................................................................................................................2 Installing Outlook Express..........................................................................................................3 Configuring Outlook Express .....................................................................................................3 Using Outlook Express ...............................................................................................................9 Importing Messages From Other Mail Programs .....................................................................12 Using the Address Book ...........................................................................................................14
    [Show full text]
  • Internet Explorer
    Internet Explorer Internet Explorer 11 To start Internet Explorer click on the icon below The procedure for identifying the version of Internet Explorer on your computer is as follows: 1. Start Internet Explorer 2. Move the cursor to the top right corner of the window and click the gear icon 3. Select “About Internet Explorer” from the drop down menu. Alternatively, you can click “Help” in the menu bar and select “About Internet Explorer“ from the menu. Useful tip: If you can’t see the “File, Edit, View, Help” menu bar, press the Alt key to make the menu bar visible. As shown below, in the “About Internet Explorer” window, you can view the Version number. Internet Explorer on your computer can be set to automatically install new versions when they become available. This can be done by checking the box to “Install new versions automatically” In the “About Internet Explorer” window. Internet Explorer 9 To view the “About” page in Internet Explorer: 1. At the top right of the program window, click the gear icon 2. Select “About Internet Explorer” in the drop down menu. The version number will be displayed in the “About Internet Explorer” window, see example below. Updating your Internet Explorer Browser Microsoft updates Internet Explorer using its Windows update feature. If you are regularly installing the latest Windows updates from Microsoft then you should be on the latest version of Internet Explorer. Note Windows 10 automatically updates Internet Explorer. Follow the procedure below to manually trigger an update of the Internet Explorer Browser: 1. Open the Control Panel.
    [Show full text]
  • Web Browsers
    WEB BROWSERS Page 1 INTRODUCTION • A Web browser acts as an interface between the user and Web server • Software application that resides on a computer and is used to locate and display Web pages. • Web user access information from web servers, through a client program called browser. • A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web Page 2 FEATURES • All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window • A refresh and stop buttons for refreshing and stopping the loading of current documents • Home button that gets you to your home page • Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent Page 3 COMPONENTS OF WEB BROWSER 1. User Interface • this includes the address bar, back/forward button , bookmarking menu etc 1. Rendering Engine • Rendering, that is display of the requested contents on the browser screen. • By default the rendering engine can display HTML and XML documents and images Page 4 HISTROY • The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. • Microsoft responded with its browser Internet Explorer in 1995 initiating the industry's first browser war • Opera first appeared in 1996; although it have only 2% browser usage share as of April 2010, it has a substantial share of the fast-growing mobile phone Web browser market, being preinstalled on over 40 million phones.
    [Show full text]