Upload
lisa-beasley
View
213
Download
1
Embed Size (px)
Citation preview
Internet BusinessInternet BusinessFoundationsFoundations
© 2004 ProsoftTrainingAll rights reserved
Lesson 2:Lesson 2:Web BrowsingWeb Browsing
ObjectivesObjectives Identify the basic functions of Web browsersIdentify the basic functions of Web browsers Install a Web browserInstall a Web browser Identify the components of Web addressesIdentify the components of Web addresses Use browsers to authenticate and encryptUse browsers to authenticate and encrypt Identify considerations in selecting a browserIdentify considerations in selecting a browser Identify and locate resources for technical dataIdentify and locate resources for technical data Identify how businesses use browsersIdentify how businesses use browsers Use various browsing techniquesUse various browsing techniques Configure Web browser preferencesConfigure Web browser preferences Define and use cookiesDefine and use cookies Configure browser security settingsConfigure browser security settings Identify the function of proxy serversIdentify the function of proxy servers Troubleshoot common Internet client problemsTroubleshoot common Internet client problems
Basic Functions of Web Basic Functions of Web BrowsersBrowsers
Provide a way for users to access and navigate Provide a way for users to access and navigate Web pages Web pages
Display Web pages properlyDisplay Web pages properly Provide technology to enable multimedia featuresProvide technology to enable multimedia features Provide access to Internet services (such as FTP, Provide access to Internet services (such as FTP,
Telnet, news servers and e-mail)Telnet, news servers and e-mail) Perform authentication and encryption functionsPerform authentication and encryption functions
Installing a Web BrowserInstalling a Web Browser
Microsoft Internet Explorer 6.0 is packaged with Microsoft Internet Explorer 6.0 is packaged with Windows XP ProfessionalWindows XP Professional
Most browser software is available on the Web or Most browser software is available on the Web or through a vendor CDthrough a vendor CD
ISPs provide browser software on installation CD-ISPs provide browser software on installation CD-ROMsROMs
You should install the latest version of a browser You should install the latest version of a browser because it will have the most recent security because it will have the most recent security featuresfeatures
Look for and install browser updates as they Look for and install browser updates as they become availablebecome available
Web AddressesWeb Addresses
Every Web page has a unique address called a Every Web page has a unique address called a URLURL
URLs typically include the protocol, the Internet URLs typically include the protocol, the Internet resource (server or host name) and the domain resource (server or host name) and the domain namename
You enter absolute URLs into your browser’s You enter absolute URLs into your browser’s Address or Location boxAddress or Location box
Relative URLs can be used for coding Web sitesRelative URLs can be used for coding Web sites
How Browsers WorkHow Browsers Work1.1. You enter a URL into the browserYou enter a URL into the browser2.2. Browser breaks the URL into three parts: Browser breaks the URL into three parts:
protocol, server and domain name, and file protocol, server and domain name, and file namename
3.3. Browser contacts a domain name server to Browser contacts a domain name server to translate server name into an IP addresstranslate server name into an IP address
4.4. Browser uses IP address to connect to Browser uses IP address to connect to serverserver
5.5. Browser uses HTTP to request a page from Browser uses HTTP to request a page from the serverthe server
6.6. Some level of authentication takes placeSome level of authentication takes place7.7. Server sends the requested page (coded in Server sends the requested page (coded in
HTML) to the browserHTML) to the browser8.8. Browser reads and interprets the HTML and Browser reads and interprets the HTML and
displays the Web pagedisplays the Web page
AuthenticationAuthentication Authentication – the process of verifying the Authentication – the process of verifying the
identity of a user who logs on to a system, or identity of a user who logs on to a system, or the integrity of transmitted datathe integrity of transmitted data
General authentication types:General authentication types:• Anonymous logon – no user name or Anonymous logon – no user name or
password is required and authentication is password is required and authentication is handled transparently by the browser and handled transparently by the browser and serverserver
• Basic authentication – a user name and Basic authentication – a user name and password are required, and that information password are required, and that information is sent as plain textis sent as plain text
• Secure authentication – a user name and Secure authentication – a user name and password are required, and they are password are required, and they are encrypted before being sent across the encrypted before being sent across the InternetInternet
• Digital certificates – you must have the Digital certificates – you must have the proper digital certificate to gain access proper digital certificate to gain access
EncryptionEncryption
Encryption – the process of converting data into Encryption – the process of converting data into an unreadable form of textan unreadable form of text
Decryption – the process of converting the Decryption – the process of converting the encrypted data back to its original formencrypted data back to its original form
Encryption and decryption are performed using Encryption and decryption are performed using keyskeys
Key – a mathematical algorithmKey – a mathematical algorithm The more complex the encryption algorithm, the The more complex the encryption algorithm, the
harder it is to decipher the encrypted message harder it is to decipher the encrypted message without access to the keywithout access to the key
Authentication protocolsAuthentication protocols Password Authentication Protocol (PAP) – used to Password Authentication Protocol (PAP) – used to
authenticate dial-up sessions for remote users authenticate dial-up sessions for remote users Challenge Handshake Authentication Protocol Challenge Handshake Authentication Protocol
(CHAP) – authenticates through a server sending (CHAP) – authenticates through a server sending a challenge phrase to a client and comparing the a challenge phrase to a client and comparing the client response (generated through a one-way client response (generated through a one-way hash function) with its own calculation of the hash function) with its own calculation of the expected hash valueexpected hash value
Microsoft Challenge Handshake Authentication Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) – a proprietary version of Protocol (MS-CHAP) – a proprietary version of CHAP used by servers running IIS CHAP used by servers running IIS
SSL and TLSSSL and TLS
Secure Sockets Layer (SSL) – a protocol for secure Secure Sockets Layer (SSL) – a protocol for secure exchangesexchanges• authenticates using digital certificatesauthenticates using digital certificates• provides for data encryptionprovides for data encryption
Transport Layer Security (TLS) – successor to SSLTransport Layer Security (TLS) – successor to SSL• becoming more commonbecoming more common• based on SSL 3.0based on SSL 3.0• provides for encryption and authenticationprovides for encryption and authentication
Secure ProtocolsSecure Protocols
Various protocols in the TCP/IP suite can be made Various protocols in the TCP/IP suite can be made secure by running them over SSL/TLS, including:secure by running them over SSL/TLS, including:• HTTPSHTTPS• S/FTPS/FTP• IMAP/SIMAP/S• POP3SPOP3S
Browser ChoicesBrowser Choices
Most popular browsers in use today are Microsoft Most popular browsers in use today are Microsoft Internet Explorer and Netscape NavigatorInternet Explorer and Netscape Navigator
Alternative browsers include:Alternative browsers include:• MozillaMozilla• OperaOpera• KonquerorKonqueror• LynxLynx• ArachneArachne
Resources for Technical DataResources for Technical Data
The following Web sites are among the many you The following Web sites are among the many you can visit for technical data:can visit for technical data:• www.netcraft.comwww.netcraft.com• www.whatis.comwww.whatis.com• www.howstuffworks.comwww.howstuffworks.com• www.learnthenet.comwww.learnthenet.com• www.microsoft.com/technetwww.microsoft.com/technet
Business Uses of BrowsersBusiness Uses of Browsers
intranet – an internal or in-house Web site used intranet – an internal or in-house Web site used only by employees within a company only by employees within a company
extranet – an internal network designed to extranet – an internal network designed to provide access to selected external users; is not provide access to selected external users; is not available to the Internet public available to the Internet public
Webinars and Web conferences – online training Webinars and Web conferences – online training or conference sessions that utilize Internet or conference sessions that utilize Internet technology to provide interactive and technology to provide interactive and presentation elements to userspresentation elements to users
Browsing TechniquesBrowsing Techniques
Techniques available to make your browsing Techniques available to make your browsing sessions more efficient:sessions more efficient:• Using Bookmarks and FavoritesUsing Bookmarks and Favorites• Using multiple windowsUsing multiple windows• Following linksFollowing links
Configuring Browser Configuring Browser PreferencesPreferences
Browser preferences you can configure to suit Browser preferences you can configure to suit your working style include:your working style include:• Browser fontsBrowser fonts• Home pageHome page• History folderHistory folder• Controlling pop-up and pop-under windowsControlling pop-up and pop-under windows• Browser cache settingsBrowser cache settings• Image loadingImage loading• Cookie handlingCookie handling• Cookie warningsCookie warnings
Configuring Browser SecurityConfiguring Browser Security
You can configure your browser’s security You can configure your browser’s security settings to accept, reject or prompt before settings to accept, reject or prompt before accepting:accepting:• ActiveX controlsActiveX controls• Java appletsJava applets
To restrict these items in Internet Explorer, set To restrict these items in Internet Explorer, set safety levels accordinglysafety levels accordingly
Proxy ServersProxy Servers
Proxy servers come between corporate networks and Proxy servers come between corporate networks and the Internetthe Internet
Proxy servers can provide the following services:Proxy servers can provide the following services:• Web document cachingWeb document caching• Corporate firewall accessCorporate firewall access
Browsers must be properly configured to work with Browsers must be properly configured to work with proxy serversproxy servers
Netscape Navigator can be manually configured to Netscape Navigator can be manually configured to work with a proxy server, or can use a proxy server’s work with a proxy server, or can use a proxy server’s URL to automatically configure itselfURL to automatically configure itself
Internet Explorer can automatically scan the network Internet Explorer can automatically scan the network for a proxy server; it can also use a configuration for a proxy server; it can also use a configuration script; or you can configure it manuallyscript; or you can configure it manually
Troubleshooting Internet Troubleshooting Internet Client ProblemsClient Problems
By adjusting browser functions and settings, you By adjusting browser functions and settings, you can troubleshoot the following client problems:can troubleshoot the following client problems:• Poor renderingPoor rendering• Slow connectionSlow connection• No connectionNo connection• Inability to render imagesInability to render images• Slow browser and other system functionsSlow browser and other system functions