Web Browsers: How Do You Surf the Internet?

Total Page:16

File Type:pdf, Size:1020Kb

Web Browsers: How Do You Surf the Internet? Skokie Public Library 4/16/2018 Web Browsers: How Do You Surf the Internet? Presentation 4/16/18 What are Web browsers? 1 Skokie Public Library 4/16/2018 • tools people use in order to access, view or upload the content on the Internet. • an image, video, text or a combination of different categories. • content is stored in form of code • use web browser to interpret the code – to view it in form of a web page 2 Skokie Public Library 4/16/2018 3 Skokie Public Library 4/16/2018 Web address • navigate the web via web addresses or URL (Uniform Resource Locator). • typed into an address bar it locates the website • Example of a website: https://skokielibrary.info/ • Example of a specific page (“Events”): https://skokielibrary.info/events 4 Skokie Public Library 4/16/2018 Hyperlink • use hyperlinks (aka links) to access related web pages online 5 Skokie Public Library 4/16/2018 Browser elements Navigation 6 Skokie Public Library 4/16/2018 Tabbed browsing Printing 7 Skokie Public Library 4/16/2018 Printing in Chrome browser 3 1 2 Printing in Firefox 3 1 2 8 Skokie Public Library 4/16/2018 Printing in Edge 1 2 3 Printing in Vivaldi 1 2 3 9 Skokie Public Library 4/16/2018 Printing Shortcut • CTRL + P • Use carefully – sometimes no print preview Privacy 10 Skokie Public Library 4/16/2018 Privacy: Chrome browser 11 Skokie Public Library 4/16/2018 Privacy: Firefox browser 12 Skokie Public Library 4/16/2018 Privacy: Vivaldi browser 13 Skokie Public Library 4/16/2018 Add-ons/Plugins 4 Chrome Add-ons 1 2 3 5 14 Skokie Public Library 4/16/2018 Firefox Add-ons Bookmarks • Local bookmarks • Bookmarks manager • Bookmarks bar 15 Skokie Public Library 4/16/2018 Add-ons • getPocket.com • Evernote.com • Bit.ly Mobile/Smartphone browsing experience • Compacted view – Mobile friendly • Web pages built for mobile 16 Skokie Public Library 4/16/2018 Browsers covered • (Google) Chrome • (Mozilla) Firefox • (Microsoft) Edge (formerly Internet Explorer) Other browsers • Safari • Opera • SeaMonkey • Vivaldi • Brave • Maxthon • Yandex 17 Skokie Public Library 4/16/2018 Explore on your own www.gcflearnfree.org/internetbasics/using-a-web-browser www.lifewire.com/what-is-a-browser-446234 Thank You Want a copy of this presentation? Visit www.skokielibrary.info/handouts where this presentation will be available for four weeks. 18.
Recommended publications
  • IN-BROWSER BLITZ LITERATURE REVIEWS 1 Submitted to Meta
    IN-BROWSER BLITZ LITERATURE REVIEWS 1 Submitted to Meta-Psychology. Participate in open peer review by commenting through hypothes.is directly on this preprint. The full editorial process of all articles under review at Meta-Psychology can be found following this link: https://tinyurl.com/mp-submissions You will find this preprint by searching for the first author's name. Writing a Psychological Blitz Literature Review with Nothing but a Browser Bogdan Cocoş1 1Department of Psychology, University of Bucharest Author Note Correspondence regarding this article should be addressed to Bogdan Cocoş, 90 Panduri Road, Sector 5, 050663, Bucharest, Romania. E-mail: [email protected] https://orcid.org/0000-0003-4098-7551 IN-BROWSER BLITZ LITERATURE REVIEWS 2 Abstract The ways so far of writing literature reviews represent valid, but not sufficient, landmarks, connected to the current technological context. In this sense, this article proposes a research method called blitz literature review, as a way to quickly, transparently, and repeatably consult key references in a particular area of interest, seen as a network composed of elements that are indispensable to such a process. The tutorial consists of six steps explained in detail, easy to follow and reproduce, accompanied by publicly available supplementary material. Finally, the possible implications of this research method are discussed, being brought to the fore a general recommendation regarding the optimization of the citizens’ involvement in the efforts and approaches of open scientific research. Keywords: blitz literature review, open access, open science, research methods IN-BROWSER BLITZ LITERATURE REVIEWS 3 Writing a Psychological Blitz Literature Review with Nothing but a Browser Context The term “blitz literature review” refers to an adaptation of the concept of literature review.
    [Show full text]
  • The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy?
    EDIT IN MASTER The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy? Andrés Arrieta - Dir of Consumer Privacy Engineering EDIT IN MASTER Who are we? Non-profit that fights for your civil liberties in the digital world. ● Certbot, HTTPS Everywhere, Panopticlick, Privacy Badger... ● AI, Coders Rights, Freedom of Speech, Privacy… We fight for the users EDIT IN MASTER Why does it matter? Browsers are most users’ window the Internet, and most users do not change the defaults. The out of the box window to the Internet defines the defaults for the rights most users enjoy. The Internet should be opt-in and empower users where the default is respecting our rights EDIT IN MASTER Who cares about more relevant ads anyway? So what if they gather some information? EDIT IN MASTER What can third-parties learn from your browser or other sources? ● Age ● Gender ● Race ● Address physical and email ● Location ● Browser ● Device ● Time spent ● What you clicked ● What you hovered ● What you buy online and offline ● Health data EDIT IN MASTER They can learn directly or infer a lot of things from your browsing habits! ● Politics ● Health condition ● Religious beliefs ● Sexual orientation ● Hobbies and interests ● Personality ● Where you are going ● Who you know and who you’ve met EDIT IN MASTER What can they do with it? ● Marketing for more “relevant” ads (That you probably learned to ignore) ● Decide what you see from your friends ● Decide what news and which outlets you see ● Decide what you should interact with (what has more engagement)
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Web Browser Pioneer Backs New Way to Surf Internet (Update 2) 7 November 2010, by MICHAEL LIEDTKE , AP Technology Writer
    Web browser pioneer backs new way to surf Internet (Update 2) 7 November 2010, By MICHAEL LIEDTKE , AP Technology Writer (AP) -- The Web has changed a lot since Marc Facebook's imprint also is all over RockMelt, Andreessen revolutionized the Internet with the although the two companies' only business introduction of his Netscape browser in the connection so far is Andreessen. He also serves on mid-1990s. That's why he's betting people are Facebook's board of directors. ready to try a different Web-surfing technique on a new browser called RockMelt. RockMelt only works if you have a Facebook account. That restriction still gives RockMelt plenty The browser, available for the first time Monday, is of room to grow, given Facebook has more than built on the premise that most online activity today 500 million users. revolves around socializing on Facebook, searching on Google, tweeting on Twitter and After Facebook users log on RockMelt with their monitoring a handful of favorite websites. It tries to Facebook account information, the person's minimize the need to roam from one website to the Facebook profile picture is planted in the browser's next by corralling all vital information and favorite left hand corner and a list of favorite friends can be services in panes and drop-down windows. displayed in the browser's left hand pane. There's also a built-in tool for posting updates in a pop-up "This is a chance for us to build a browser all over box. again," Andreessen said. "These are all things we would have done (at Netscape) if we had known The features extend beyond Facebook and Twitter.
    [Show full text]
  • Surfing on an Interactive Kiosk
    Surfing on an Interactive Kiosk Leon Anavi Konsulko Group [email protected] [email protected] Yocto Project Summit 2021 Konsulko Group Services company specializing in Embedded Linux and Open Source Software Hardware/software build, design, development, and training services Based in San Jose, CA with an engineering presence worldwide http://konsulko.com/ Yocto Project Summit 2021, Leon Anavi, Surfing on an Interactive Kiosk Agenda Using web browsers for an interactive kiosk Openbox and Surf Building an image Conclusions Q&A Yocto Project Summit 2021, Leon Anavi, Surfing on an Interactive Kiosk Web Browser Market Share Yocto Project Summit 2021, Leon Anavi, Surfing on an Interactive Kiosk Yocto/OE Layer for Mainstream Web Browsers meta-browser https://github.com/OSSystems/meta-browser Available in GitHub under MIT license Sub-layer with recipes for Chromium Sub-layer with recipes for Firefox Yocto Project Summit 2021, Leon Anavi, Surfing on an Interactive Kiosk Surf Web Browser Minimalist web browser No graphical control elements Controlled via keyboard shortcuts or external tools Based on WebKit2/GTK+ Developed by suckless.org Initial release in 2009 Available under MIT License Yocto Project Summit 2021, Leon Anavi, Surfing on an Interactive Kiosk Surf in meta-openembedded/meta-oe Yocto Project Summit 2021, Leon Anavi, Surfing on an Interactive Kiosk Surf Web Browser Requirements: Requires X11 and OpenGL Depends on WebKitGTK, GTK+ 3, glib-2.0 and gcr WebKitGTK is a full-featured port of the WebKit2 rendering
    [Show full text]
  • Membandingkan Kinerja Web Browser
    Membandingkan Kinerja Web Browser Daniel Setiawan, Rendra Setiawan , Rizka Karunia, Rory, I Wayan S. Wicaksana Sistem Informasi, Fakultas Ilmu Komputer, Universitas Gunadarma Jl. KH. Noer Ali, Kalimalang, Bekasi 17134 Telp : (021) 88860117 E-mail : dani_el.s, rendra_bgtz, rizka_1989 @studentsite.gunadarma.ac.id [email protected] Abstrak Internet adalah suatu komunikasi antara satu komputer dengan lainnya secara global melalui suatu media komunikasi. Selain itu, internet juga menyediakan berbagai macam informasi dari seluruh dunia. Sarana yang digunakan dalam mencari informasi ataupun komunikasi melalui internet, kita dapat menggunakan beberapa web browser yang terkenal saat ini. Makalah ini membahas mengenai kinerja web browser, ada lima web browser yang akan digunakan meliputi Mozilla Firefox, Google Chrome, Opera, Safari, dan Maxthon. Kami melakukan beberapa metodologi seperti, fitur, kecepatan, tes benchmark. 1. Pendahuluan 2. Penggunaannya atau pengoperasiannya harus 1.1. Latar Belakang simple sehingga mudah digunakan dan dipahami Internet yang berawal dari riset untuk cara kerjanya. pertahanan dan keamanan serta pendidikan berkembang 3. Kecepatan browser akan membuat penggunanya menjadi perangkat pendukung bisnis yang sangat yang sedang surfing akan menjadi nyaman. Hal ini berpengaruh. Browser adalah program aplikasi yang tergantung pada kemampuan browser, memproses menterjemahkan kode HTML dan merepresentasikan HTML dan Javascript dengan cepat, dan yang halaman web site. Aplikasi inilah yang paling sering paling penting dapat kompetibel dengan semua kita gunakan setiap hari untuk melakukan browsing di jenis website. dunia maya. Jenis browser saat ini semakin banyak dan 4. Fasiltas keamanan harus mutlak tersedia. Karena berkembang denganpesat diantaranya adalah Internet gangguan saat kita browsing dapat datang kapan Explorer, Mozilla Firefox, Opera, Google Chrome, pun. Mulai dari pop-up iklan, virus, hingga praktek Safari, Netscape, Flock, Avant Browser, dll.
    [Show full text]
  • FTP Instructions for Shtetlinks
    SFTP Instructions for KehilaLinks SFTP stands for Secure File Transfer Protocol and is a simple way of moving files from your computer to the KehilaLinks server. 1. SFTP Access a. Your KehilaLinks SFTP Username and Password will bring you directly into the folder assigned to your site. You will see an empty space when you enter the SFTP site; the folder is not visible. b. If you manage more than one KehilaLink site, you will be provided a single UserName and Password. This Logon will bring you to a listing of KehilaLinks site folders. Instructions for accessing multiple sites: i. When you logon, you will be on a site with multiple KehilaLink site folders. ii. Double click on the folder that you will be working with. You can then browse, download and upload as needed. Follow instructions in 2 below for downloading and uploading. iii. To go to another of the sites that you manage, return to the KehilaLinks site folders screen and select the next site that you will work on. iv. If you go to a site that you are not authorized for, you can browse the folder, but will get an error message when you try to upload. 2. You can use FTP software which can be downloaded free from such sites as www.download.com or www.cnet.com/ . I will not recommend one package over another. If you use FTP software, the URL to use to SFTP is Sftp.jewishgen.org You will be provided with a Login/Username and a Password. If the software requests a port number, this value is 22.
    [Show full text]
  • Forensic Study and Analysis of Different Artifacts of Web Browsers in Private Browsing Mode
    || Volume 5 || Issue 6 || June 2020 || ISSN (Online) 2456-0774 INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH AND ENGINEERING TRENDS FORENSIC STUDY AND ANALYSIS OF DIFFERENT ARTIFACTS OF WEB BROWSERS IN PRIVATE BROWSING MODE Rinchon Sanghkroo1, Dr. Deepak Raj Rao G.2 and Kumarshankar Raychaudhuri3 M.Sc. (Forensic Science) Final Semester Student, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India 1 Assistant Professor, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India2 Junior Research Fellow, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India3 [email protected], [email protected], [email protected] ------------------------------------------------------ ***-------------------------------------------------- Abstract: - Web browsers today have become one of the most commonly used applications in digital devices, storing and maintaining huge information on user activities. The privacy mode has been introduced to combat the privacy issues related with browsers. This feature keeps the browsing activities of a user private by not storing or removing the traces of artifacts related to the browsing session on the system. In this study, we test the effectiveness of this claim and to ensure ways in which a forensic investigation may be done in such cases. The private modes of different browsers have been tested in Windows and MAC OS by performing pre-defined browsing activities in each of the browsers in both the operating systems. Moreover, the default locations of normal web browser artifacts are also examined to find whether artifacts of private browsing activities are stored in such locations or not. Keywords: - Private Browsing, Windows, MAC, Safari, Microsoft Edge, Brave Browser ------------------------------------------------------ ***-------------------------------------------------- I INTRODUCTON artifacts related to it on the end device.
    [Show full text]
  • Web Privacy Beyond Extensions
    Web Privacy Beyond Extensions: New Browsers Are Pursuing Deep Privacy Protections Peter Snyder <[email protected]> Privacy Researcher at Brave Software In a slide… • Web privacy is a mess. • Privacy activists and researchers are limited by the complexity of modern browsers. • New browser vendors are eager to work with activists to deploy their work. Outline 1. Background Extension focus in practical privacy tools 2. Present Privacy improvements require deep browser modifications 3. Next Steps Call to action, how to keep improving Outline 1. Background Extension focus in practical privacy tools 2. Present Privacy improvements require deep browser modifications 3. Next Steps Call to action, how to keep improving Browsers are Complicated uBlock PrivacyBadger Disconnect AdBlock Plus Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Extensions as a Compromise uBlock PrivacyBadger Disconnect AdBlock Plus Runtime Extensions modifications Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Privacy and Browser Extensions � • Successes! uBlock Origin, HTTPS Everywhere, Ghostery, Disconnect, Privacy Badger, EasyList / EasyPrivacy, etc… • Appealing Easy(er) to build, easy to share • Popular Hundreds of thousands of extensions, Millions of users Browser Extension Limitations � • Limited Capabilities Networking, request modification, rendering, layout, image processing, JS engine, etc… • Security and Privacy Possibly giving capabilities to malicious parties • Performance Limited to JS, secondary access Extensions vs Runtime uBlock PrivacyBadger Disconnect AdBlock Plus Runtime Extensions modifications Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Under Explored Space uBlock PrivacyBadger Disconnect ? AdBlock Plus Runtime Extensions modifications Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Outline 1. Background Extension focus in practical privacy tools 2.
    [Show full text]
  • Forensic Investigation of User's Web Activity on Google Chrome Using
    IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.9, September 2016 123 Forensic Investigation of User’s Web Activity on Google Chrome using various Forensic Tools Narmeen Shafqat, NUST, Pakistan Summary acknowledged browsers like Internet Explorer, Google Cyber Crimes are increasing day by day, ranging from Chrome, Mozilla Firefox, Safari, Opera etc. but should confidentiality violation to identity theft and much more. The also have hands on experience of less popular web web activity of the suspect, whether carried out on computer or browsers like Erwise, Arena, Cello, Netscape, iCab, smart device, is hence of particular interest to the forensics Cyberdog etc. Not only this, the forensic experts should investigator. Browser forensics i.e forensics of suspect’s browser also know how to find artifacts of interest from older history, saved passwords, cache, recent tabs opened etc. , therefore supply ample amount of information to the forensic versions of well-known web browsers; Internet Explorer, experts in case of any illegal involvement of the culprit in any Chrome and Mozilla Firefox atleast, because he might activity done on web browsers. Owing to the growing popularity experience a case where the suspected person is using and widespread use of the Google Chrome web browser, this older versions of these browsers. paper will forensically analyse the said browser in windows 8 According to StatCounter Global market share for the web environment, using various forensics tools and techniques, with browsers (2015), Google Chrome, Mozilla Firefox and the aim to reconstruct the web browsing activities of the suspect. Microsoft’s Internet Explorer make up 90% of the browser The working of Google Chrome in regular mode, private usage.
    [Show full text]
  • Parlando Di Brachetto & C. Per I Costi Dei Concerti Guerra Aperta Bosio
    ANC080824001e2_ac1e2:Layout 1 20-08-2008 17:37 Pagina 1 Poste Italiane S.p.A. - Spedizione in abb. postale - D.L. 353/2003 (conv. in L. 27/02/2004 nº 46) art. 1, comma 1, DCB/AL SETTIMANALEDIINFORMAZIONE - DOMENICA 24 AGOSTO 2008 - ANNO 105 - N. 30 - € 1,00 La nuova società, Merlo s.r.l., dal 1º agosto ha acquisito lo stabilimento dal gruppo Granarolo Tragico incidente in montagna Due famiglie di imprenditori Cordoglio per la morte risolvono la crisi del caseificio Merlo di Marco Somaglia Acqui Terme. Il caseificio nunciando un piano di rilan- Acqui Terme. In un clima di Merlo è salvo. C’è di più. Ri- cio del marchio e notevoli in- grande commozione, alle guarda il futuro del persona- vestimenti. 16.30 di lunedì 18 agosto si le, una soluzione che preve- La famiglia Pagella, già sono svolti i funerali di Marco de il mantenimento del posto proprietaria del biscottificio Somaglia, il giovane di 16 anni di lavoro per 42 dipendenti, Accornero di Cuneo e della deceduto precipitando per 150 occupazione che sino a qual- «Girardengo» di Bosco Ma- metri dalla Rocca Provenzale, che mese fa pareva com- renco, fabbrica che era arri- in Valle Maira. promessa dalla grave ed in- vata a produrre alcune mi- Una tragedia che si è con- tricata situazione in cui ver- gliaia di biciclette al giorno, sumata sotto gli occhi del pa- sava il caseificio. Oggi, per fa parte della migliore im- dre. La chiesa di San France- l’azienda di regione Domini a prenditoria della nostra pro- sco, dove è stata celebrata la Terzo, si parla anche di un vincia.
    [Show full text]