Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Business Foundations © 2004 ProsoftTraining All rights reserved.

Similar presentations


Presentation on theme: "Internet Business Foundations © 2004 ProsoftTraining All rights reserved."— Presentation transcript:

1 Internet Business Foundations © 2004 ProsoftTraining All rights reserved

2 Lesson 2: Web Browsing

3 Objectives Identify the basic functions of Web browsers Identify the basic functions of Web browsers Install a Web browser Install a Web browser Identify the components of Web addresses Identify the components of Web addresses Use browsers to authenticate and encrypt Use browsers to authenticate and encrypt Identify considerations in selecting a browser Identify considerations in selecting a browser Identify and locate resources for technical data Identify and locate resources for technical data Identify how businesses use browsers Identify how businesses use browsers Use various browsing techniques Use various browsing techniques Configure Web browser preferences Configure Web browser preferences Define and use cookies Define and use cookies Configure browser security settings Configure browser security settings Identify the function of proxy servers Identify the function of proxy servers Troubleshoot common Internet client problems Troubleshoot common Internet client problems

4 Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Provide a way for users to access and navigate Web pages Display Web pages properly Display Web pages properly Provide technology to enable multimedia features Provide technology to enable multimedia features Provide access to Internet services (such as FTP, Telnet, news servers and e-mail) Provide access to Internet services (such as FTP, Telnet, news servers and e-mail) Perform authentication and encryption functions Perform authentication and encryption functions

5 Installing a Web Browser Microsoft Internet Explorer 6.0 is packaged with Windows XP Professional Microsoft Internet Explorer 6.0 is packaged with Windows XP Professional Most browser software is available on the Web or through a vendor CD Most browser software is available on the Web or through a vendor CD ISPs provide browser software on installation CD- ROMs ISPs provide browser software on installation CD- ROMs You should install the latest version of a browser because it will have the most recent security features You should install the latest version of a browser because it will have the most recent security features Look for and install browser updates as they become available Look for and install browser updates as they become available

6 Web Addresses Every Web page has a unique address called a URL Every Web page has a unique address called a URL URLs typically include the protocol, the Internet resource (server or host name) and the domain name URLs typically include the protocol, the Internet resource (server or host name) and the domain name You enter absolute URLs into your browser’s Address or Location box You enter absolute URLs into your browser’s Address or Location box Relative URLs can be used for coding Web sites Relative URLs can be used for coding Web sites

7 How Browsers Work 1. You enter a URL into the browser 2. Browser breaks the URL into three parts: protocol, server and domain name, and file name 3. Browser contacts a domain name server to translate server name into an IP address 4. Browser uses IP address to connect to server 5. Browser uses HTTP to request a page from the server 6. Some level of authentication takes place 7. Server sends the requested page (coded in HTML) to the browser 8. Browser reads and interprets the HTML and displays the Web page

8 Authentication Authentication – the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data Authentication – the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data General authentication types: General authentication types: Anonymous logon – no user name or password is required and authentication is handled transparently by the browser and serverAnonymous logon – no user name or password is required and authentication is handled transparently by the browser and server Basic authentication – a user name and password are required, and that information is sent as plain textBasic authentication – a user name and password are required, and that information is sent as plain text Secure authentication – a user name and password are required, and they are encrypted before being sent across the InternetSecure authentication – a user name and password are required, and they are encrypted before being sent across the Internet Digital certificates – you must have the proper digital certificate to gain accessDigital certificates – you must have the proper digital certificate to gain access

9 Encryption Encryption – the process of converting data into an unreadable form of text Encryption – the process of converting data into an unreadable form of text Decryption – the process of converting the encrypted data back to its original form Decryption – the process of converting the encrypted data back to its original form Encryption and decryption are performed using keys Encryption and decryption are performed using keys Key – a mathematical algorithm Key – a mathematical algorithm The more complex the encryption algorithm, the harder it is to decipher the encrypted message without access to the key The more complex the encryption algorithm, the harder it is to decipher the encrypted message without access to the key

10 Authentication protocols Password Authentication Protocol (PAP) – used to authenticate dial-up sessions for remote users Password Authentication Protocol (PAP) – used to authenticate dial-up sessions for remote users Challenge Handshake Authentication Protocol (CHAP) – authenticates through a server sending a challenge phrase to a client and comparing the client response (generated through a one-way hash function) with its own calculation of the expected hash value Challenge Handshake Authentication Protocol (CHAP) – authenticates through a server sending a challenge phrase to a client and comparing the client response (generated through a one-way hash function) with its own calculation of the expected hash value Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) – a proprietary version of CHAP used by servers running IIS Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) – a proprietary version of CHAP used by servers running IIS

11 SSL and TLS Secure Sockets Layer (SSL) – a protocol for secure exchanges Secure Sockets Layer (SSL) – a protocol for secure exchanges authenticates using digital certificatesauthenticates using digital certificates provides for data encryptionprovides for data encryption Transport Layer Security (TLS) – successor to SSL Transport Layer Security (TLS) – successor to SSL becoming more commonbecoming more common based on SSL 3.0based on SSL 3.0 provides for encryption and authenticationprovides for encryption and authentication

12 Secure Protocols Various protocols in the TCP/IP suite can be made secure by running them over SSL/TLS, including: HTTPSHTTPS S/FTPS/FTP IMAP/SIMAP/S POP3SPOP3S

13 Browser Choices Most popular browsers in use today are Microsoft Internet Explorer and Netscape Navigator Most popular browsers in use today are Microsoft Internet Explorer and Netscape Navigator Alternative browsers include: Alternative browsers include: MozillaMozilla OperaOpera KonquerorKonqueror LynxLynx ArachneArachne

14 Resources for Technical Data The following Web sites are among the many you can visit for technical data: www.netcraft.comwww.netcraft.com www.whatis.comwww.whatis.com www.howstuffworks.comwww.howstuffworks.com www.learnthenet.comwww.learnthenet.com www.microsoft.com/technetwww.microsoft.com/technet

15 Business Uses of Browsers intranet – an internal or in-house Web site used only by employees within a company intranet – an internal or in-house Web site used only by employees within a company extranet – an internal network designed to provide access to selected external users; is not available to the Internet public extranet – an internal network designed to provide access to selected external users; is not available to the Internet public Webinars and Web conferences – online training or conference sessions that utilize Internet technology to provide interactive and presentation elements to users Webinars and Web conferences – online training or conference sessions that utilize Internet technology to provide interactive and presentation elements to users

16 Browsing Techniques Techniques available to make your browsing sessions more efficient: Using Bookmarks and FavoritesUsing Bookmarks and Favorites Using multiple windowsUsing multiple windows Following linksFollowing links

17 Configuring Browser Preferences Browser preferences you can configure to suit your working style include: Browser fontsBrowser fonts Home pageHome page History folderHistory folder Controlling pop-up and pop-under windowsControlling pop-up and pop-under windows Browser cache settingsBrowser cache settings Image loadingImage loading Cookie handlingCookie handling Cookie warningsCookie warnings

18 Configuring Browser Security You can configure your browser’s security settings to accept, reject or prompt before accepting: You can configure your browser’s security settings to accept, reject or prompt before accepting: ActiveX controlsActiveX controls Java appletsJava applets To restrict these items in Internet Explorer, set safety levels accordingly To restrict these items in Internet Explorer, set safety levels accordingly

19 Proxy Servers Proxy servers come between corporate networks and the Internet Proxy servers come between corporate networks and the Internet Proxy servers can provide the following services: Proxy servers can provide the following services: Web document cachingWeb document caching Corporate firewall accessCorporate firewall access Browsers must be properly configured to work with proxy servers Browsers must be properly configured to work with proxy servers Netscape Navigator can be manually configured to work with a proxy server, or can use a proxy server’s URL to automatically configure itself Netscape Navigator can be manually configured to work with a proxy server, or can use a proxy server’s URL to automatically configure itself Internet Explorer can automatically scan the network for a proxy server; it can also use a configuration script; or you can configure it manually Internet Explorer can automatically scan the network for a proxy server; it can also use a configuration script; or you can configure it manually

20 Troubleshooting Internet Client Problems By adjusting browser functions and settings, you can troubleshoot the following client problems: Poor renderingPoor rendering Slow connectionSlow connection No connectionNo connection Inability to render imagesInability to render images Slow browser and other system functionsSlow browser and other system functions


Download ppt "Internet Business Foundations © 2004 ProsoftTraining All rights reserved."

Similar presentations


Ads by Google