World Wide Web Navegar Internet Con W3

Total Page:16

File Type:pdf, Size:1020Kb

World Wide Web Navegar Internet Con W3 World Wide Web Navegar Internet con W 3 Director Lic. Javier F. Díaz Alumnos Andrea M. Keiliff Gabriel Bonnefon Gil A nuestros padres. WWW INDICE BIBLIOTECA rAC. DE INFORMÁTICA U.N.L.P. 1. ¿ QUÉ ES WORLD WIDE WEB ? ....................................................................... 4 1.1 COMO FUNCIONA W EB?.................................................................................4 1.2 ¿ PORQUÉ ES IMPORTANTE ? ........................................................................5 1.3 CONCEPTOS BÁSICOS.................................................................................... 6 1.3.1 HYPERLINK ..................................................................................................6 1.3.2 URL [10]........................................................................................................ 7 1.3.3 LENGUAJE DE TAGS HTML [8] [9 ].............................................................8 2. HTML..................................................................................................................... 9 2.1 INTRODUCCIÓN................................................................................................ 9 2.2 HTML 3.0 [9]........................................................................................................9 2.3 CARACTERÍSTICAS DE ELEMENTOS HTML................................................ 10 2.4 ESTRUCTURA DE UN DOCUMENTO HTML..................................................11 2.4.1 <HEAD> Y ELEMENTOS RELACIONADOS ..............................................12 2.4.2 <BODY> Y ELEMENTOS RELACIONADOS ..............................................14 2.4.2.1 LISTAS..................................................................................................16 2.4.2.1.1 LISTAS SIN ORDEN......................................................................16 2.4.2.1.2 LISTAS CON ORDEN....................................................................17 2.4.2.1.3 LISTAS DE DEFINICIÓN...............................................................17 2.4.2.2 TABLAS.................................................................................................18 2.4.2.2.1 FILA DE LA TABLA........................................................................ 19 2.4.2.2.2 CELDAS DE LA TABLA.................................................................19 2.4.2.3 TEXTO PREFORMATEADO................................................................19 2A2.4 ELEMENTO FORM..............................................................................20 2.4.2.4.1 INPUT........................................................................................... 20 2.4.2A2 TEXTAREA.................................................................................... 22 2A2.4.3 SELECT......................................................................................... 22 3. PROTOCOLO HTTP.......................................................................................... 23 3.1 PROPÓSITO......................................................................................................23 3.2 TERMINOLOGÍA.............................................................................................. 23 3.3 OPERACIÓN.....................................................................................................25 4. SERVIDORES HTTP.......................................................................................... 28 4.1 QUE ES CGI ? .................................................................................................. 28 4.2 TESTEO DEL SERVIDOR................................................................................ 29 4.3 ARMADO DE HOME PAGE..............................................................................29 4.4 CONVENCIONES PARA ACCESO PÚBLICO................................................. 30 4.5 ANUNCIO DEL SERVIDOR.............................................................................. 30 5. SERVIDOR NCSA.............................................. 31 5.1 CONFIGURACIÓN DE UN SITIO ESPECÍFICO 31 5.2 ARRANCAR EL SERVER.................................. 33 1 WWW 5.3 MAPEO DE URL A DOCUMENTOS.................................................................34 5.4 MAS RASGOS...................................................................................................34 5.4.1 AGREGANDO TIPOS MIME......................................................................34 5.4.2 INCLUDES SERVER-SIDE........................................................................35 5.4.3 ÍNDICE DE DIRECTORIO AUTOMÁTICO................................................ 35 5.4.4 MULTIHOME/ VIRTUALHOST..................................................................36 5.4.5 IMAGEMAP.................................................................................................37 5.5 SEGURIDAD EN NCSA HTTPD......................................................................... 38 5.6 DIRECTIVAS DE HTTPD.CONF...........................................................................38 5.7 DIRECTIVAS DE SRM.CONF..............................................................................42 5.8 DIRECTIVAS DE ACCESS.CONF........................................................................46 6. SERVIDOR CERN.............................................................................................. 50 6.1 CONFIGURACIÓN DE UN SITIO ESPECÍFICO............................................. 51 6.2 ARRANCAR EL SERVIDOR.............................................................................51 6.3 MAPEO DE URLS [10]...................................................................................... 52 6.4 CARACTERÍSTICAS PARTICULARES............................................................53 6.4.1 PROXY [Cap 10]........................................... 53 6.4.2 CACHING....................................................................................................54 6.4.3 CONTROL DE ACCESO............................................................................54 6.4.4 PROTECCIÓN A NIVEL USUARIOS..........................................................54 6.4.5 MANEJO DE TIPOS MIME [10]..................................................................55 6.4.6 MANEJO DE SCRIPTS.............................................................................. 56 6.5 PRINCIPALES DIRECTIVAS............................................................................57 6.5.1 DIRECTIVAS GENERALES.......................................................................57 6.5.2 DIRECTIVAS DE CONTROL DE LOGGING ............................................. 58 6.5.3 DIRECTIVAS DE MAPEO DE URLs...........................................................59 6.5.4 DIRECTIVAS DE DEFINICION DE SUFIJOS............................................ 60 6.5.5 DIRECTIVAS DE SETEOS DE TIMEOUTS.............................................. 61 6.5.6 DIRECTIVAS DE PROXY-CACHING.........................................................61 6.5.7 DIRECTIVAS PARA CONFIGURAR UN PROXY CONECTADO A OTRO PROXY................................................................................................................. 63 6.5.8 DIRECTIVAS PARA BROWSEO DE DIRECTORIOS............................... 64 6.5.9 DIRECTIVAS PARA MANEJO DE ICONOS.............................................. 65 7. BROWSERS........................................................................................................66 7.1 NCSA Mosaic [http://www.ncsa.uiuc.edu/] ....................................................69 7.2 Microsoft Internet Explorer [ http://www.msn.com/ ] ...................................... 70 7.3 Netscape Navigator [ http://www.nestcape.com/ ] .......................................... 71 8. SEGURIDAD........................................................................................................73 8.1 DOS PROPUESTAS DE SEGURIDAD EN WEB ............................................ 74 8.1.1 SSL.............................................................................................................. 74 8.1.2 SECURE HTTP...........................................................................................75 8.1.2.1 RASGOS.............................................................................................. 76 8.1.2.2 MODOS DE OPERACIÓN....................................................................76 9. ROBOTS.............................................................................................................78 2 WWW 9.1 USO DE LOS ROBOTS................................................................................... 78 9.2 COMO FUNCIONAN LOS ÍNDICES................................................................79 9.2.1 WEBCRA WLER [ http://www. webcrawler.com/ ] .................................... 80 9.2.2 LYCOS [ http://www.lycos.com/] .............................................................81 10. PROXY.............................................................................................................. 83 10.1 DETALLES TÉCNICOS.......................... 84 10.2 RASGOS DEL LADO DEL CLIENTE........................................................... 86 10.3 RASGOS DEL LADO DEL SERVIDOR..........................................................86 10.4 CACHING........................................................................................................87 10.4.1 TIEMPO DE VIDA EN LA CACHE...........................................................87 10.4.2 INTERVALO GARANTIZADO DE REFRESCO
Recommended publications
  • Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies
    The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies Vinod Anupam and Alain Mayer Bell Laboratories, Lucent Technologies For more information about USENIX Association contact: 1. Phone: 510 528-8649 2. FAX: 510 548-5738 3. Email: [email protected] 4. WWW URL:http://www.usenix.org/ Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies Vino d Anupam Alain Mayer Bel l Laboratories, Lucent Technologies 600 Mountain Avenue Murray Hil l, NJ 07974 fanupam,alaing@bel l-labs.com we discovered do es not lead to full system p enetra- Abstract tion where an attacker can access a user's resources While conducting a security analysis of JavaScript les, pro cesses at will. It might thus be argued and VBScript, the most popular scripting languages that such aws are less serious. However, security on the Web, we found some serious aws. Moti- and privacy concerns see, e.g., cover story of Time vated by this outcome, we propose steps towards a Magazine, dated 8/15/97 have b een the single most sound de nition and design of a security framework imp ortant barrier to electronic commerce achieving for scripting languages on the Web. We show that if its multi-billion dollar p otential. In this light, at- such a security framework had been integrated into tacks on a user's security and privacy, are a matter the respective scripting languages from the very be- of serious concern.
    [Show full text]
  • Minimum Software Requirements
    PrimePay Web-Based System Requirements Document Title PrimePay System Requirements Document Goal Detail the system requirements for PrimePay’s Web‐based application. Table of Contents 1.0 Minimum Software Requirements ................................................................................................... 2 2.0 Supported web browsers and operating systems ............................................................................ 2 2.1. How‐to check your operating system ........................................................................................... 2 2.2. Where can I download the most recent version of Internet Explorer? ........................................ 2 2.3. Where can I download the most recent version of Firefox? ........................................................ 2 3.0 Monitor Settings ............................................................................................................................... 2 3.1. Optimal screen resolution ............................................................................................................. 2 3.1.1. How‐to adjust the screen resolution on your monitor ......................................................... 3 3.2. Optimal color quality .................................................................................................................... 3 3.2.1. How‐to adjust the color quality on your monitor ................................................................. 3 3.2.2. How‐to adjust your display resolution .................................................................................
    [Show full text]
  • Enabling TLS 1.2 in Major Browsers
    Enabling TLS 1.2 in Major Browsers Table of Contents Updating Microsoft Internet Explorer ...................................................................................................................................................... 2 Enabling or Disabling TLS Protocols in Internet Explorer .................................................................................................................... 2 Updating Mozilla Firefox ........................................................................................................................................................................... 3 Enabling or Disabling TLS Protocols in Firefox .................................................................................................................................... 4 Updating Google Chrome ......................................................................................................................................................................... 5 Enabling or Disabling TLS Protocols in Chrome .................................................................................................................................. 5 Updating Apple Safari ............................................................................................................................................................................... 7 Enabling or Disabling TLS Protocols in Apple Safari ............................................................................................................................ 7 Appendix
    [Show full text]
  • CAPPS Help Peopletools 8.56 Browser Info Tips
    PeopleTools 8.56 - Browser Information & Tips Contents Introduction ................................................................................................................................................................2 Clear Browser Cache ...................................................................................................................................................2 Internet Explorer ....................................................................................................................................................2 Google Chrome .......................................................................................................................................................7 Internet Explorer Settings ..........................................................................................................................................5 User sees Blank Screen ...............................................................................................................................................6 Page 1 of 10 Introduction This document contains Internet Browsers Information & Tips that are applicable to the PeopleTools 8.56 upgrade. Clear Browser Cache When alternating between multiple versions of PeopleTools on the same machine, your browser cookies may interfere with the rendering of pages and other functionality. It is recommended that you clear your browser cache. Internet Explorer 11 The following are instructions for clearing cache if you are using Internet Explorer. 1. Access
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Ideas Behind the Coding of the Trivia Quiz
    01 555871 Ch01.qxd 4/2/04 11:40 AM Page 1 1 Introduction to JavaScript and the Web In this introductory chapter, we’ll take a look at what JavaScript is, what it can do for you, and what you need to be able to use it. With these foundations in place, we will see throughout the rest of the book how JavaScript can help you to create powerful web applications for your website. The easiest way to learn something is by actually doing it, so throughout the book we’ll be creat- ing a number of useful example programs using JavaScript. We start this process in this chapter, by the end of which you will have created your first piece of JavaScript code. Additionally over the course of the book, we’ll develop a complete JavaScript web application: an online trivia quiz. By seeing it develop, step-by-step, you’ll get a good understanding of how to create your own web applications. At the end of this chapter, we’ll look at the finished trivia quiz and discuss the ideas behind its design. Introduction to JavaScript In this section, we’re going to take a brief look at what JavaScript is, where it came from, how it works, and what sorts of useful things we can do with it. What Is JavaScript?COPYRIGHTED MATERIAL Having bought this book you are probably already well aware that JavaScript is some sort of com- puter language, but what is a computer language? Put simply, a computer language is a series of instructions that instruct the computer to do something.
    [Show full text]
  • Universidade Federal De Juiz De Fora Curso De Graduação Em Engenharia De Produção
    UNIVERSIDADE FEDERAL DE JUIZ DE FORA CURSO DE GRADUAÇÃO EM ENGENHARIA DE PRODUÇÃO GABRIEL D’AGOSTO PACHE DE FARIA DESENVOLVIMENTO DE UM PRODUTO MÍNIMO VIÁVEL DE UM SOFTWARE DE GESTÃO DE EVENTOS ATRAVÉS DA METODOLOGIA SCRUM JUIZ DE FORA 2021 GABRIEL D’AGOSTO PACHE DE FARIA DESENVOLVIMENTO DE UM PRODUTO MÍNIMO VIÁVEL DE UM SOFTWARE DE GESTÃO DE EVENTOS ATRAVÉS DA METODOLOGIA SCRUM Trabalho de Conclusão de Curso apresentado a Faculdade de Engenharia da Universidade Federal de Juiz de Fora, como requisito parcial para a obtenção do título de Engenheiro de Produção. Orientador: DSc Roberta Cavalcanti Pereira Nunes JUIZ DE FORA 2021 Ficha catalográfica elaborada através do programa de geração automática da Biblioteca Universitária da UFJF, com os dados fornecidos pelo(a) autor(a) d'Agosto Pache de Faria, Gabriel. Desenvolvimento de um Produto Minimo de um software de gestão de eventos através da metodologia Scrum / Gabriel d'Agosto Pache de Faria. -- 2021. 47 p. Orientadora: Robera Cavalcanti Pereira Nunes Trabalho de Conclusão de Curso (graduação) - Universidade Federal de Juiz de Fora, Faculdade de Engenharia, 2021. 1. Eventos. 2. MVP. 3. Protótipo. 4. Aplicativo. I. Cavalcanti Pereira Nunes, Robera, orient. II. Título. GABRIEL D’AGOSTO PACHE DE FARIA DESENVOLVIMENTO DE UM PRODUTO MÍNIMO VIÁVEL DE UM SOFTWARE DE GESTÃO DE EVENTOS ATRAVÉS DA METODOLOGIA SCRUM Trabalho de Conclusão de Curso apresentado a Faculdade de Engenharia da Universidade Federal de Juiz de Fora, como requisito parcial para a obtenção do título de Engenheiro de Produção. Aprovada em 15 de março de 2021. BANCA EXAMINADORA ____________________________________________________ Prof. DSc. Roberta Cavalcanti Pereira Nunes Universidade Federal de Juiz de Fora ___________________________________________________pp Prof.
    [Show full text]
  • Introduction to Ajax
    Introduction to Ajax Dott. Ing. Giulio Piancastelli [email protected] Ingegneria Due Alma Mater Studiorum – Universit`adi Bologna a Cesena Academic Year 2006/2007 Dott. Ing. Giulio Piancastelli Introduction to Ajax What is Ajax? I A cleaning powder I A Dutch football team I A Greek hero I A different approach to web interaction I None of the previous I All of the previous Dott. Ing. Giulio Piancastelli Introduction to Ajax History of web interaction (1/2) I JavaScript gets released and for the first time developers are able to affect the interaction between the user and the web page (Netscape Navigator 2) I Frame are introduced and the web page can be split up into several documents (Netscape Navigator 2) I The ability to use JavaScript to control a frame and its contents lets the hidden frame technique for client-server interaction emerge I A frame represents a completely separated request to the server I The technique represents the first asynchronous request/response model for web applications Dott. Ing. Giulio Piancastelli Introduction to Ajax History of web interaction (2/2) I DHTML enables developers to alter any part of a loaded page by using JavaScript. Combining it with hidden frames let any part of a page to be refreshed with server information at any time (Internet Explorer 4) I Implementation of the DOM standard and the iframe HTML element let the hidden iframe technique emerge: dynamic creation of an iframe to make a request and get a response on the fly (Internet Explorer 5, Netscape 6) I The XMLHttp object gets introduced as an ActiveX control: an ad-hoc HTTP request that can be controlled from JavaScript independently from the page load/reload cycle (Internet Explorer 5) I An XMLHttpRequest native JavaScript object gets implemented by virtually every modern web browser Dott.
    [Show full text]
  • Effective Web Design, Second Edition
    Effective Web Design Effective Web Design, Second Edition Ann Navarro SYBEX® Associate Publisher: Cheryl Applewood Contracts and Licensing Manager: Kristine O'Callaghan Acquisitions and Developmental Editor: Raquel Baker Editors: Joseph A. Webb, James A. Compton, Colleen Wheeler Strand Production Editor: Dennis Fitzgerald Technical Editor: Marshall Jansen Book Designer: Maureen Forys, Happenstance Type-O-Rama Graphic Illustrator: Tony Jonick Electronic Publishing Specialist: Maureen Forys, Happenstance Type-O-Rama Proofreaders: Nelson Kim, Nancy Riddiough, Leslie E.H. Light Indexer: Ann Rogers CD Coordinator: Christine Harris CD Technician: Kevin Ly Cover Designer: Design Site Cover Illustrator/Photographer: Dan Bowman Copyright © 2001 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. page 1 Effective Web Design The author(s) created reusable code in this publication expressly for reuse by readers. Sybex grants readers limited permission to reuse the code found in this publication or its accompanying CD-ROM so long as (author(s)) are attributed in any application containing the reusable code and the code itself is never distributed, posted online by electronic transmission, sold, or commercially exploited as a stand- alone product. Aside from this specific exception concerning reusable code, no part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. An earlier version of this book was published under the title Effective Web Design © 1998 SYBEX Inc. Library of Congress Card Number: 2001088112 ISBN: 0-7821-2849-1 SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc.
    [Show full text]
  • Yardi Voyager Microsoft Internet Explorer Browser Configuration Guide
    Yardi Voyager Microsoft Internet Explorer Browser Configuration Guide A CorporateS Website Client Central v_cor_iex_rev_c Documentation and Online Help Published by Yardi Systems, Inc. 430 South Fairview Avenue Santa Barbara, CA 93117 © 2014 by Yardi Systems, Inc. All rights reserved. This product or document is protected by copyright, trademark and other intellectual property laws. Use of the product or document is subject to the terms and conditions of an authorized Yardi Systems, Inc. software license or other agreement including, but not limited to, restrictions on its use, copying, disclosure, distribution and decompilation. NOTHING IN THIS DOCUMENTATION IS INTENDED TO SUPERSEDE ANY EXPRESS WRITTEN AGREEMENTS PROVIDED BY YARDI SYSTEMS FOR PORTIONS OF ANY YARDI SYSTEMS PRODUCT OR SERVICE OTHER THAN THIS DOCUMENTATION. No part of this product or document may be disclosed or reproduced in any form by any means without the prior written authorization of Yardi Systems, Inc. This product or document contains proprietary information about software processes, algorithms, and data models which is Confidential Information, and constitutes trade secrets, and which is intended for utilization solely in connection with Yardi software licensees' use of Yardi software and for no other purpose. The inclusion of any references to third-party products and services in this documentation does not imply endorsement by Yardi Systems of such products or services or the third party, or an affiliation between Yardi Systems and such third party. Yardi Systems is not responsible for, and does not control, any third-party products and services including, without limitation, the compatibility, performance, content, trustworthiness, legality, or any other aspect of such products and services.
    [Show full text]
  • Part I Getting Started with Javascript
    Part I Getting Started with JavaScript IN THIS PART Chapter 1 JavaScript’s Role in the World Wide Web and Beyond Chapter 2 Developing a Scripting Strategy Chapter 3 Selecting and Using Your Tools Chapter 4 JavaScript Essentials COPYRIGHTED MATERIAL JavaScript’s Role in the World Wide Web and Beyond any of the technologies that make the World Wide Web possible have far exceeded their original goals. Envisioned at the outset as IN THIS CHAPTER Ma medium for publishing static text and image content across a network, the Web is forever being probed, pushed, and pulled by content How JavaScript blends with authors. By taking for granted so much of the ‘‘dirty work’’ of conveying the other web-authoring bits between server and client computers, content developers and programmers technologies dream of exploiting that connection to generate new user experiences and practical applications. It’s not uncommon for a developer community to The history of JavaScript take ownership of a technology and mold it to do new and exciting things. What kinds of jobs you should But with so many web technologies — especially browser programming and should not entrust with JavaScript — within reach of everyday folks, we have witnessed an to JavaScript unprecedented explosion in turning the World Wide Web from a bland publishing medium into a highly interactive, operating system–agnostic authoring platform. The JavaScript language, working in tandem with related browser features, is a web-enhancing technology. When employed on the client computer, the lan- guage can help turn a static page of content into an engaging, interactive, and intelligent experience.
    [Show full text]
  • Kenneth Arnes Ryan Paul Jaca Network Software Applications History
    Kenneth Arnes Ryan Paul Jaca Network Software Applications Networks consist of hardware, such as servers, Ethernet cables and wireless routers, and networking software. Networking software differs from software applications in that the software does not perform tasks that end-users can see in the way word processors and spreadsheets do. Instead, networking software operates invisibly in the background, allowing the user to access network resources without the user even knowing the software is operating. History o Computer networks, and the networking software that enabled them, began to appear as early as the 1970s. Early networks consisted of computers connected to each other through telephone modems. As personal computers became more pervasive in homes and in the workplace in the late 1980s and early 1990s, networks to connect them became equally pervasive. Microsoft enabled usable and stable peer-to-peer networking with built-in networking software as early as 1995 in the Windows 95 operating system. Types y Different types of networks require different types of software. Peer-to-peer networks, where computers connect to each other directly, use networking software whose basic function is to enable file sharing and printer sharing. Client-server networks, where multiple end-user computers, the clients, connect to each other indirectly through a central computer, the server, require networking software solutions that have two parts. The server software part, running on the server computer, stores information in a central location that client computers can access and passes information to client software running on the individual computers. Application-server software work much as client-server software does, but allows the end-user client computers to access not just data but also software applications running on the central server.
    [Show full text]