Source: 20 Things I Learned About Browsers and the Web
This is an e-book produced by the Google chrome team in 2010 due to the need for ladders in the country. . Become a porter
Many people nowadays are inseparable from the Internet , we can obtain global information at the touch of a finger and be exposed to people and activities around the world in an instant.
All these powerful experiences are thanks to the open Internet. Anyone in the world can access the Internet through a browser from any device connected to the Internet.
But how exactly do browsers and the web work? How did the World Wide Web get to what we know and love today? What do we need to know to browse the web safely and effectively?
"20 Things I Learned About Browsers and the Web" is a short guide for anyone who wants to learn the basics of browsers and the web. This guide covers the following:
First we’ll introduce you to the Internet, the foundation on which the web exists. We'll also cover how today's networks operate through cloud computing and web applications.
Next, we’ll introduce the basics of building web pages, such as HTML and JavaScript, and review how their invention and development have impacted the websites you visit every day. We'll also look at modern browsers and how they can help users access the web more securely.
Finally, we look ahead to exciting innovations in browser and web technologies that we believe will lead to faster and more immersive online experiences in the future.
Although online life makes us feel free and omnipotent, we should still know more about it. Just as we want to understand the basic situation of residential areas in real life (such as water and electricity safety, precautions, peripheral services, etc.), it is increasingly necessary for us to understand a series of similar information about online life. That's why we wrote this guide. Among the many examples given when talking about browser capabilities, we often mention Chrome, the well-known open source browser. We hope you have as much fun reading this guide as we did writing it.
Happy browsing!
The Google Chrome team would like to thank illustrator Christoph Niemann
November 2010
What exactly is the Internet? For some people, the Internet is about communicating with friends, reading news, shopping and playing games. For others, the internet may be their local broadband provider,
or the underground cables and fiber optics that carry data between cities or even across oceans. Whose view is correct?
To discuss this, we might as well start from 1974, the birth of the Internet. That year, a few talented computer researchers invented a technology called the "Internet Protocol Suite," or "TCP/IP" for short.
TCP/IP creates a set of rules that allow different computers to "talk" to each other and send and receive information.
TCP/IP is somewhat similar to communication between humans: when people talk, they organize their language according to grammatical rules to ensure that they can understand each other and communicate with each other. Likewise, TCP/IP provides a set of communication rules that ensure that interconnected devices understand each other in order to send and receive information. As this network of interconnected devices expanded from one room to many rooms, to many buildings, cities, and even countries, the Internet was born.
The early creators of the Internet discovered that data and information could be sent more efficiently if they were broken into small chunks and sent independently, then reassembled. These small chunks are called packets. So, when you send an email over the Internet, the complete email content is first broken into many packets and sent to the recipient's mailbox, and then reassembled. The same thing happens when you watch a video on a site like YouTube: the video file is broken into many packets, sent from multiple YouTube servers around the world, and then reassembled back into the video you see in your browser.
How is the internet speed? If the traffic of the Internet is compared to water flow, then the bandwidth of the Internet is equivalent to the amount of water flowing per second. So what engineers call bandwidth is actually the amount of data that can be sent per second over your internet connection. This is a metric that reflects the speed of your connection. Today, with better physical infrastructure (such as fiber optic cables, which can transmit data close to the speed of light), network connections can be faster and better at encoding information on the physical medium, even older media like copper wire That's totally fine too.
The Internet is a fascinating and highly technical system, but for most of us, it is actually very easy to use without having to think about the complicated things like cables and equations involved.
Additionally, the Internet is the backbone of the existence of the World Wide Web we know and love: it is Internet connections that enable interconnected web pages and applications, bringing us into an ever-evolving Open world. In fact, there may be as many web pages on the Internet today as there are neurons in the human brain or stars in the Milky Way.
In the next two chapters, we will introduce how today's network is used in real life through cloud computing and network applications.
Modern computer technology in the Internet era is quite magical and remarkable. When you sit at home on your laptop watching YouTube videos or using a search engine, you are tapping into the collective power of countless computers around the world to remotely provide you with the information you need. It's almost like having a giant supercomputer at your disposal, and it's all thanks to the Internet.
This phenomenon is what we usually call "cloud computing". Nowadays we can all read news, listen to music, shop, watch TV and store files on the Internet.
In the city we live in, almost every museum, bank and government department has its own website. What was the result? We can pay bills and make appointments through these websites, thus saving time in queues and phone calls. Many daily tasks can be handled by the Internet, so that we can live a more colorful life.
Cloud computing has several other benefits. A few years ago, many people worried about losing documents, photos, and files if their computer had problems like a virus infection or hardware failure. Today, we no longer limit data storage to personal computers, but have migrated to the Internet and stored data online in the "cloud". If you upload photos online, store important files, and use web email like Gmail or Yahoo! Mail, then even if an 18-wheeler drives over your laptop, all your data will still be safe on the web. No matter where you are in the world, you can access this data through any computer connected to the Internet.
If you play online games, use online photo editor or If you rely on web-based services such as Google Maps, Twitter, Amazon, YouTube or Facebook, you are already an active member of the world of web applications.
What exactly are web applications? What does it have to do with us?
"App" is the abbreviation of application. Applications are also called programs or software. Historically, applications were developed to complete comprehensive, intensive tasks such as financial management or word processing. Now, in the online world of web browsers and smartphones, apps are often more flexible programs that are specialized for a single task. Web applications, in particular, can run these tasks within a web browser and often provide rich, interactive experiences.
Google Maps is a great example of a web application. It's designed to do one thing: provide useful map functionality in a web browser. You can pan and zoom the map, search for a college or coffee shop, get driving directions, and more. All the information you need is dynamically displayed in the web app based on your requirements.
We can summarize the four major advantages of web applications:
In the old days of desktop applications, data was typically stored on your computer's hard drive. If I go on vacation but leave my computer at home, I can't check email, view photos, or access any data I need. And in the new age of web apps, my email and all my data is stored on the web. You can use any computer with Internet access to get the data you need through a web browser.
What version of YouTube am I using today? What about tomorrow? The answer is: always the latest. Web apps update automatically, so there's always only one version: the latest version that includes all the latest features and improvements. There is no need to manually upgrade to a new version every time or spend a lot of time installing it before you can use it.
With traditional computer technology, some programs can only run on specific systems or devices. For example, many programs written for PCs will not run on a Mac. Developing appropriate software for each system or device is time-consuming and costly. In contrast, the web is an open platform. Anyone can access the web through a browser on a device connected to the web, whether that device is a laptop, desktop computer or mobile phone. This means I can run my favorite web applications even on a friend's laptop or an Internet cafe computer.
Web applications run in the browser and do not need to be downloaded to your own computer. Because the application code is separate from the computer code, the web application does not affect other tasks on my computer or the overall performance of my computer. It also means I’m better protected against threats like viruses, malware and spyware.
Web pages are written in HTML, a web programming language that instructs browsers how to structure and display content on web pages. In other words, HTML provides the foundation upon which web pages are built. For a long time, these building blocks were simple and static, consisting only of lines of text, links, and images.
Nowadays, our requirements are higher. For example, we want to play chess online or seamlessly scroll through the surrounding map, but we don’t want to have to wait for the entire web page to reload every time we make a chess move or scroll the map.
The idea of dynamic web pages has been around since the invention of JavaScript scripting language. JavaScript is supported in all major web browsers, which means web pages can contain more important, real-time interactive content. For example, if you fill out an online form and click the "Submit" button, the page will use JavaScript to check your input in real time and alert you if you make a mistake.
But in fact, the dynamic web pages we know now were only realized after JavaScript introduced XHR (XMLHttpRequest), and then First implemented in web applications such as Microsoft Outlook on the web, Gmail, and Google Maps. XHR allows you to change various parts of a webpage, including games, maps, videos, online user surveys, and more, without reloading the entire webpage. In this way, web applications become faster and more responsive.
After the introduction of CSS (Cascading Style Sheets), web pages have richer expressiveness. CSS gives programmers an easy and effective way to define the layout of web pages and beautify them with design elements such as color, rounded corners, gradients, and animations.
Web programmers often refer to the powerful combination of JavaScript, XHR, CSS, and several other web technologies as AJAX (Asynchronous JavaScript and XML). HTML also continues to evolve, with new features and improvements being added to new versions of the HTML standard.
Countless technologists, idea experts, programmers and organizations create web technologies and ensure they are supported by web browsers such as Internet Explorer, Firefox, Safari and Google Chrome. Thanks to people's unremitting efforts, the online world has achieved today's prosperity. Network technology and browsers complement each other, turning the network into an open and friendly building platform for network developers to develop various practical and interesting network applications for us to use in our daily lives.
More than 20 years after the birth of HTML, we Still exploring questions like: What is a network? What will the future of the Internet look like? For us users, what kind of functions and applications are interesting, useful or even indispensable? What tools do developers need to build great websites and apps? Finally, how do you realize the benefits of the web in a web browser?
Exploration of the above issues gave rise to the latest version of HTML, which is HTML5. It has a series of new features that can help web designers and developers develop powerful next-generation web applications. Take the
Internet users only had installed plug-ins called Additional software is required to watch videos in your browser. Soon after, easily watching videos became a feature that was urgently needed by the majority of users. The
HTML5 also offers some other great features, such as offline functionality (which allows users to interact with web applications even without an internet connection) and drag-and-drop functionality. For example, in Gmail, users can add attachments instantly by dragging and dropping files on their desktop into the browser window.
HTML5, like the web itself, is constantly evolving based on the needs of users and the visions of developers. As an open standard, HTML5 combines some of the best advantages of the web: it runs regardless of location and on devices with next-generation browsers.
However, just like HD TV programs can only be watched on HD TVs, users must use the latest version of a browser that is compatible with HTML5 to access websites and applications that use HTML5 features. program. Fortunately, there are many different browsers for Internet users to choose from. It costs money to buy a TV, but browsers can be downloaded for free.
3D graphics and animations are truly fascinating because they capture all the details, such as light and shadow, reflections, and realistic textures. However, achieving compelling 3D experiences has so far been elusive, especially on the Internet.
Why is this? The main reason is that creating 3D experiences in games and other applications requires massive amounts of data to display complex and detailed textures and shapes. Previously, most commonly used systems were unable to handle such massive amounts of data due to limitations in Internet bandwidth and computing power.
Not long ago, everything changed: the era of browser-based 3D is here!
Today’s broadband networks help solve the problem of bandwidth requirements. Many homes and offices now have broadband installed, providing far more bandwidth than a decade ago. As a result, large amounts of data can be sent over the Internet to achieve the requirement of experiencing realistic 3D effects in the browser. Moreover, the performance of today's computers is far from what it used to be: processors and memory have been significantly improved, and even today's ordinary laptops or desktop computers can handle complex 3D graphics.
But the key is that browser functions have made great progress, otherwise it will be useless to rely solely on broadband or computing power. Many modern browsers leverage open web technologies such as WebGL and 3D CSS. With these technologies, web developers can create cool 3D effects for web applications that we don’t need to install additional plug-ins to experience. On top of that, many modern browsers now feature a technology called "hardware acceleration." This means that browsers can use graphics processing units, or GPUs, to speed up calculations needed to render both 3D and everyday 2D web content.
So why is browser support for 3D so important? Because 3D technology is now a common tool in web development, along with HTML5, JavaScript, and other powerful new technologies, web developers can use these technologies to create powerful next-generation web applications. For users, this means new and better ways to visually see useful information and more fun when experiencing 3D environments and playing 3D games online.
Most importantly, browser support for 3D brings benefits to web apps: you can share, collaborate, and personalize the latest apps with friends around the world. It goes without saying that more data and more fun are available to everyone.
Old browsers and modern browsers cannot coexist: modern browsers are fast, full-featured, and secure. Old browsers run slowly and have a lot of weaknesses that make them weak when malicious attacks occur.
Most internet users may not yet realize how much of a negative impact outdated, old web browsers can have on our online lives, especially on online security. You don't want to be driving a classic car for years and years with worn tires, failed brakes, and a frequent engine failure. Likewise, you shouldn't use outdated, old browsers to access web pages and web applications every day.
Upgrade to the latest version of a modern browser such as Mozilla Firefox, Apple Safari, Microsoft Internet Explorer, Opera or Google Chrome. This is necessary for three reasons:
First, older browsers often cannot be updated with the latest security patches and features, making them extremely vulnerable to attacks. Browser security holes can lead to user passwords being stolen, malware sneaking into computers, or even other more serious consequences. And the latest versions of browsers can help protect you against security threats like phishing and malware.
Second, the Internet is developing very rapidly. Older browsers may not support many of the latest features found in today's websites and web applications. Only the latest version of the browser offers speed improvements, plus support for modern web technologies like HTML5, CSS3, and fast JavaScript, allowing you to access web pages and run applications quickly.
Third, older browsers hinder the pace of innovation on the web. If a large number of Internet users are stuck with older browsers, web developers will have to design websites with both old and new technologies in mind. Faced with limited time and resources, they had to stop developing innovative next-generation web applications for modern browsers in order to accommodate the low standards of older browsers. (Imagine this as today's highway engineers are forced to design highways according to the safety standards of classic cars.) Therefore, both for the majority of Internet users and Internet innovation, outdated browsers are harmful. And there is no benefit at all.
It’s understandable if you’re reluctant to part with your aging browser. In some cases, you may not be able to upgrade your browser. If you find that you are unable to upgrade your browser on your work computer, please contact your company's IT administrator. If you can't upgrade from an older version of Internet Explorer, you can use the Google Chrome Frame plug-in to bring some of the features of Google Chrome into Internet Explorer, giving you access to some of the advanced features of modern web applications.
Outdated legacy browsers not only harm users but also hinder the pace of innovation across the web. So please be sure to take a moment to upgrade your favorite modern browser to the latest version.
Editor's Note: At the time of launching this guide, the latest stable versions of the major modern browsers are as follows: Firefox 3.6, Safari 5, Google Chrome 7, Internet Explorer 8 and Opera 10.63. To find out which browser you are using, visit www.whatbrowser.org.
In the early stages of the development of the World Wide Web, the first version of HTML was unable to transmit advanced content like video and was basically limited to text, images, and links.
In order to break the limitations of early HTML and deliver more interactive content, plug-ins came into being.
A plug-in is an add-on software designed to handle specific types of content. For example, users can download and install plug-ins such as Adobe Flash Player to view web pages that contain videos or interactive games.
How interactive is the plugin with the browser? Oddly enough, there is almost no interaction between them. Plug-in mode is a lot like picture-in-picture on TV: the browser defines a clear space for the plug-in on the web page and then stays out of it. Plug-ins can freely use this space without being affected by the browser.
This independence means that a specific plug-in can work with many different browsers. However, this ubiquity also makes plug-ins a prime target for browser security attacks. If you are not running the latest version of a plug-in, your computer will be more vulnerable to security attacks because outdated plug-ins do not contain the latest security patches.
The plug-in model we use today is mainly inherited from the early Internet. However, the web community is currently finding new uses for plug-in modernization, such as clever ways to integrate plug-ins more seamlessly so that plug-in content can be searched and linked, and that allow plug-ins to interact with the rest of the web page.
More importantly, some browser vendors and plug-in providers will now cooperate to protect users from security risks. For example, the Google Chrome team and the Adobe Flash Player team have collaborated to integrate Flash Player into the browser. Chrome's automatic updates help ensure that the Flash Player plug-in remains future-proof and receives the latest security fixes and patches.
Browser extensions allow you to add new features to your browser, literally "extending" it.
This means you can customize your browser to add the most important features. You can think of extensions as adding powerful new features to your browser's existing functionality.
These features can be large or small, it all depends on your needs. For example, you can install a currency conversion extension and once it's installed, a new button will appear next to your browser's address bar.
Click this button to convert all prices on the current web page into the currency you specify. If you're a backpacker who's used to planning and booking your trip online, this extension can be helpful. You can use similar features of these extensions on all web pages.
Browser extensions can also run on their own outside of web pages. Email notification extensions can be integrated into your browser toolbar, check your email account in the background for new messages and then notify you. In this case, the extension will always run in the background no matter what web page you are browsing. This way, you don't have to log into your email in a separate window to check for new messages.
When browser extensions were first created, developers often had to write them in some unusual programming language or in a large, mainstream programming language like C. This requires a lot of work, time and professional knowledge. Adding more code to the browser also increases security risks because it provides attackers with more opportunities to exploit. In the past, some extensions had a reputation for causing browser crashes due to their obscure code.
Most browsers today allow developers to create extensions using friendly basic web programming languages such as HTML, JavaScript, and CSS. These are also the languages in which most web applications and web pages today are developed, so today's extensions are more compatible with web applications and web pages. Extensions are faster, easier, and more secure to develop, and they continue to improve along with the web standards on which they are built.
To find new extensions, check out your browser's extension gallery. There you'll find thousands of extensions to make your browsing experience more efficient or more fun, some letting you highlight content on web pages and take notes as you search, and some through your browser. The interface brings you exciting live coverage of sports events.
Congratulations, you are now in the "cloud"! You use web applications to send and receive email, listen to music, and do just about everything else. No matter where you are, you can save important documents, photos and various files online through any computer with Internet access.
Even if an 18-wheeler truck roars and crushes your laptop, you won’t lose any data. Wisely, you have already saved your important information online. Now you only need to find another device with Internet access to get the important information and continue working.
But what about the things you use every day like bookmarks, browser extensions, and browser preferences? Will they disappear along with your laptop?
It used to be possible. That’s when you have to go back to searching for all your favorite extensions and recollecting all the websites you’ve worked so hard to bookmark. But now you don’t have to worry about it anymore! Today, many browsers like Firebox and Chrome are working on a feature called Sync. The sync feature lets you save your browser settings online to the "cloud" so they won't be lost if your computer melts.
In addition, if you use multiple computers (such as a laptop at work and a desktop computer at home), the synchronization function will be very convenient. You don't have to manually re-create bookmarks for favorite sites on each computer, or reconfigure your browser.
As long as your browser has sync capabilities, changes you make on one computer will automatically be reflected on other synced computers within seconds.
Take "Chrome Browser" as an example, the sync function can save all bookmarks, extensions, preferences and themes to your Google Account. Just open Chrome and sign in to your Google Account using your browser's sync feature from any other computer with Internet access. Look! All your favorite browser settings are now available on your new computer.
No matter how many computers you have access to, as long as you have Internet access and a modern browser that syncs to the "cloud", you're all set. It doesn't matter if these computers are crushed by the legendary truck. <🎜> "Cookie" may not seem like a technical term, but it provides a vital function for Internet users: recording the websites visited or currently visited.
A cookie is a small piece of text sent to your browser by a website you visit. This contains information about your visit that you want the website to remember, such as your preferred language or some other settings. The browser will save these data and recall them the next time you visit the website to provide you with a more convenient and personalized visit experience.
For example, when you visit a movie website and indicate that a certain comedy is your favorite, the cookie sent by the website will record this so that when you visit next time , you will see a lot of comedies.
The online shopping cart also uses cookies. For example, when you browse DVDs on a premium movie site, you may find that you can add DVDs to your shopping cart without logging in. Even as you navigate through the different pages of the site, your shopping cart will never "forget" your DVD selection because your selection has been saved via your browser's cookie. In addition, online advertising also uses cookies to record your interests and hobbies and display relevant advertisements when you visit web pages.
But some people don’t like to use cookies, so most modern browsers provide the function of managing cookies to meet the needs of different users. You can better protect your privacy by setting specific rules for managing cookies on different websites. This means you can choose the sites you trust, allow cookies from only those sites, and block cookies from other sites. There are many types of cookies, including "session-only cookies" that only exist during a specific browsing session, and "persistent cookies" that last across multiple browser sessions.
Therefore, modern browsers often provide fine-tuned controls that allow you to set different types of cookies according to your preferences, such as setting persistent cookies to single-session cookies.
In Google Chrome, there is a special direct link in the Options menu that takes you to Adobe Flash Player's Storage Settings Manager. This link allows you to easily control the local data stored by Adobe Flash Player (also commonly referred to as "Flash Cookies") that contains information about Flash-based websites or applications that you have visited. Just like you can manage browser cookies, you can easily control the settings of Flash cookies.
Browser and Privacy
Protect your privacy in your browser
Security and privacy are closely related, but not entirely equivalent. You can imagine the security and privacy measures in your home: door locks and alarm systems help you prevent theft, while curtains and blinds prevent passers-by from peeking into the privacy of your life.
Likewise, browser security helps protect you against malware, phishing, and other online attacks, while privacy protection features are on your computer to help protect you while you browse privacy.
Let’s take a deeper look at privacy. Let’s use an analogy: You’re a runner who logs in several miles every day. If you carry a GPS device with you to record your daily runs, you can create a log of your running data on the device: where you ran, how far you ran, what your average speed was, and how many calories you burned.
When you browse the web, your computer will also generate and store a similar browser data log locally, which includes records about the websites you browse, the cookies sent to the browser, and the files you downloaded. All files. If you set your browser to save passwords or form data, this data will also be stored on your computer.
Some people may not realize that all of this browsing data can be cleared from your computer at any time. This can be easily done through your browser's Options or Preferences menu. (Menu names vary from browser to browser.) In fact, most recent versions of modern browsers also offer a "private" or "incognito" mode. For example, in Chrome's incognito mode, any pages you browse won't appear in your browsing history. Additionally, all new cookies will be deleted after you close all open incognito windows. This mode is convenient if you share your computer with other people, or use a public computer at a local library or Internet cafe.
With all these privacy controls in your browser, you can control browsing data locally on your computer or specific data sent by your browser to websites. However, your browser's privacy settings cannot control whether these other websites obtain your data, such as personal information you have previously submitted on these websites.
Of course, there are ways to restrict websites from obtaining certain information while you are browsing. Many browsers let you adjust your privacy preferences for different websites and make your own choices about certain data, such as cookies, JavaScript, and plug-ins. For example, you can set up rules to only allow cookies from a set of sites you trust, and have your browser block cookies from all other sites.
There is always a bit of a conflict between privacy and efficiency. Collecting actual aggregated data and feedback from a wide range of users can really help improve the product and user experience. The key is to find the optimal balance between privacy and efficiency while adhering to strict privacy standards.
The following uses browser cookies as a practical example to illustrate this point. On the one hand, if you use cookies, websites you frequently visit can record the items in your shopping cart, keep you logged in, and provide a more practical and personalized browsing experience based on your previous browsing history
Verify. Allowing browser cookies, on the other hand, means that the website will collect and record information about your previous visits. If you wish, you can choose to block cookies at any time. This way, the next time you want to fine-tune your browser privacy settings, you can modify them in your browser's Options or Preferences menu.
When you are using an ATM in a busy city, you may look around to make sure no one is snooping on your password or stealing your cash. Actually, you should probably check to see if the ATM is real first. When you browse and transact online, there are two major security risks to watch out for: malware and phishing. Certain individuals or organizations may use these attacks to attempt to steal your personal information or break into your computer.
So, what exactly are phishing and malware attacks?
Phishing is when someone pretends to be someone else, usually through a fake website, to get your personal information. (The term "phishing" is derived from the English word "phishing," as these malicious actors drop bait and wait for others to take the bait.) Phishing typically works like this: The attacker offers you Send an email that looks like it's from a bank or Internet service provider you're familiar with. The subject line of this email may be "Please update your bank information!" The email contains a phishing link that makes you think you are going to your bank's website, but it is actually a fake website. The fake website prompts you to log in, so you inadvertently reveal your bank account number, credit card number, password, or other sensitive information to the attacker.
Malware is different and often gets installed on your computer without your knowledge. This type of software may prompt you to download an antivirus software, when in fact it is a virus itself. Alternatively, some web pages may even install software on your computer without prompting you when you visit them. The real intention of this software is to steal credit card numbers or passwords from your computer and sometimes harm your computer. Once malware is installed on your computer, it is not only difficult to remove, but it also has free access to any data and files it finds and sends that information elsewhere, often causing serious damage to your computer.
The latest version of a modern web browser is the first line of defense against phishing and malware attacks. For example, most modern browsers can help you analyze web pages for signs of possible malware and alert you if they are found.
In addition, attackers may not always use sophisticated technical means to break into your computer, and sometimes they may also use tricks to trick you into making wrong decisions. The following chapters will show you how to make smarter decisions about staying safe online, using browsers and other web technologies.
The latest version of the browser protects you from phishing and malware attacks when you browse the web. This is achieved by limiting the three types of security risks you face when surfing the Internet:
When you visit malicious fake websites or get compromised Anytime you become familiar with a website, you are at risk of being attacked. Most modern browsers can pre-check every web page you visit and alert you if one appears to be malicious. This way, you can make an informed decision about whether you really want to visit this page.
For example, Google Chrome uses Safe Browsing technology, which is also used in several other modern browsers. As you browse the web, your browser quickly compares each page against a list of suspected phishing and malware sites. This list is stored and maintained locally on your computer to help protect your browsing privacy. If a match is found from the local list, the browser sends a request to Google for more information. (This request is fully encrypted and is not sent in plain text.) If Google verifies a match, Chrome displays a red warning page to alert you that the page you're trying to access may be risky.
Older browsers that have not been upgraded may have security holes that can be exploited. Whether it's an operating system, browser, or plug-in, all out-of-date software suffers from the same security issues.
Therefore, it is necessary to use the latest version of the browser and apply security patches to the operating system and plug-ins in a timely manner to ensure that their security patches are always up to date.
Some browsers can automatically check for updates and install them based on user actions. Chrome and some other browsers are more advanced when it comes to updating, with built-in automatic updates. These browsers run update checks regularly and then automatically upgrade to the latest version without affecting browsing. In addition, Adobe Flash Player and PDF Viewer are integrated into Chrome, and these popular plug-ins are also automatically updated.
Modern browsers such as Chrome and Internet Explorer Browsers have an additional layer of protection built into them called a "sandbox." Just like a real-life sandbox has walls to prevent sand from escaping, a browser's sandbox creates a closed environment that prevents malware and other security threats from invading your computer. When you open a malicious web page, the browser's sandbox prevents the malicious code from spreading outside the browser and installing itself on your hard drive. This way, malicious code cannot read, change, or further damage the data on your computer.
All in all, modern browsers can protect you from cybersecurity threats by: first, checking the websites you want to visit for malware or phishing; second, discovering new, more secure versions Finally, update prompts or automatic updates will be provided; third, browser sandboxing is used to prevent malicious code from further damaging the computer.
In the following chapters, we will introduce some basic knowledge about URLs to help you make more informed choices about the websites you want to visit.
Uniform Resource Locators (also known as URLs) may sound complicated, but don’t worry, they are actually what you want to access a specific web page or web application. program, type the URL in your browser.
When you enter a URL, a hosting server somewhere in the world crawls the website and transmits it over a long cable to your local internet connection , and ultimately displayed in the browser on your computer.
Here are a few examples of URLs:
... Visit the BBC News website ( ".co.uk" means this website is registered in the UK)
... Visit the Google search engine.
...Visit the website of the Museo Nacional Del Prado in Madrid (".es" indicates that the website is registered in Spain)
... Go to Bank of America's online banking website ("https://" indicates this is an encrypted connection)
We type URLs into our browsers every day, and we take it for granted. But we should know every aspect of a URL to help protect against any kind of phishing or security attack.
Let’s take the following URL as an example:
http://www.google.com/maps Protocol hostname path top-level domain name
The first part of the URL is called Agreement. In the example above, the HTTP protocol is short for Hypertext Transfer Protocol.
The "www.google.com" part of the website after the agreement is the name of the host to which it belongs. When any individual or company creates a new website, they will register a host name of their own, and it will be used only by themselves. As we will talk about later, this is very important.
The hostname part of the URL may be followed by a path that takes you to a specific web page on that host, like jumping directly to a chapter in a book or a certain page. Let's go back to the example where the path tells the host server that you want to access the Maps web application (aka "Google Maps") at www.google.com. Sometimes this path is prepended to the host name as a subdomain, for example, "maps.google.com" for "Google Maps" or "news.google.com" for "Google News."
Now let’s talk about security. One way to tell if you've been phished or landed on a fake website is to look closely at the URL in your browser's address bar. Pay special attention to the hostname: remember that only the legitimate owner can use the hostname.
For example, you click on a link to visit the Bank of America website:
If you want to use sensitive information such as passwords or account numbers to access bank websites or conduct online transactions, please check the URL in the address bar first! Make sure that the protocol of the URL is "https://" and that a lock icon appears in the browser address bar. "https://" indicates that a secure connection is used to transmit data between the server and the browser.
The full URL of the Bank of America website using a secure connection would look like this: https://www.bankofamerica.com. A secure connection ensures that others cannot steal or tamper with the sensitive information you send. So "https://" is a good sign. However, please note that it is still necessary to check the hostname of the URL to ensure that you are visiting a legitimate website. (This will spot fake websites that use secure connections!)
In the next chapter, we’ll show you how typing a URL into your browser’s address bar will redirect you to the corresponding page.
Would you like to know when you are in When typing a URL into the address bar, how does the browser find the corresponding web page?
Each URL (for example, "www.google.com") corresponds to a numeric Internet Protocol (IP) address.
Looks like this:
74.125.19.147An IP address is a string of numbers that represents the location of a specific device on a network , such as where is google.com or where is your computer.
It's a bit like your mom's phone number: calling your mom's phone number tells the operator to get the call to your mom, while the IP address tells your Which device on the network the computer communicates with, that is, sends and receives data.
There are 35 billion devices (or more) connected to the Internet in the world. Browsers cannot automatically identify each IP address and can only use the so-called "Domain Name System" (i.e. DNS). Search one by one. DNS is essentially the Internet's "phone book": the function of the phone book is to convert a name like "Quanjude Roast Duck" into the corresponding phone number; while DNS is to convert a URL (for example, "www.google.com") into the corresponding phone number. Connect to the corresponding IP address (for example, "74.125.19.147") to get the information you want (in this case, the Google homepage).
When you type "google.com" into your web browser, the browser looks up the IP address of google.com through DNS and connects to it, waiting for the target address to respond. to confirm the connection and then send your request to the google.com page to that IP address. The Google server at that IP address receives the request and sends the requested web page back to your computer's IP address, allowing your browser to display the web page.
However, there are many differences between using a browser to get and load a web page versus making a phone call. When you make a call, the process may be as follows: look up the phone number, dial the number, wait for the other party to answer, say "hello" when connected, wait for the other party to respond, and then start the conversation. Sometimes there's a problem with the connection and you have to replay. On the web, a similar process happens in a split second; you type "www.google.com" into your browser and the Google homepage appears.
In the next chapter, we will introduce how to verify the identity of the website through the Extended Verification Certificate when using the browser to obtain and load the website.
In real life, you can directly see the people you share information with. You can talk to the person face to face or meet in a trusted location like a bank branch. This is how you create a first impression and determine whether the person is trustworthy.
But on the Internet, it’s hard to know who is behind the website. Some of the superficial signs we often rely on may be false. For example, a fake web page mimics the logo, icons, and design of a real bank website, as if it were a fake storefront in your neighborhood.
Luckily, there are tools that can help you determine the authenticity of a website. Some websites have an Extended Validation Certificate that allows you to determine the name of the organization that operates the website. The information provided by this Extended Validation certificate can help you ensure that your personal information is not disclosed to fake websites.
The following example shows how to do extended validation in a browser. If a bank's website has passed extended verification, the bank's name will appear in the green box between the address bar's lock icon and the URL.
Example of the Extended Verification flag in Chrome
Most browsers provide the Extended Verification flag as long as it is in the green part of the browser address bar You can find out by looking up the name of the relevant organization. You can also click on the logo to view the security information and digital certificate of the website.
Website owners must pass a series of checks, and only after their legal identity and authority are confirmed can they obtain an extended verification certificate. In the previous example, the extended validation for bankofamerica.com yielded a positive result that the website is indeed the official website of Bank of America. You can think of this certificate as a link that connects the domain name of the website to a certain identity in reality.
Only provide sensitive information to this website if you trust the organization operating the website. Therefore, in the future, before you handle sensitive information online, be sure to review the security information of the website in question. You'll find that it's definitely worth it.
Today’s Internet is like a hodgepodge of all kinds of colors, flavors, and flavors, with tons of pictures, photos, videos, and fantastic network applications. Some of the most vivid experiences on the web come from images and videos, such as shared photo albums of a family vacation or online video reports posted by war correspondents.
Today’s Internet has gone far beyond the simple text and links of the past. This means that every time your browser loads a web page, it has more data and more complex code to process.
How much has the data volume and complexity increased? Here are some shocking statistics:
So, will this influx of data slow down the browser’s loading of web pages? Will the Internet soon become a mess due to congestion?
This is unlikely. Computer scientists have found ways to compress images and photos into smaller files that can be easily sent and downloaded, making them widely available on the Web. GIF and JPEG were the most commonly used formats in early file compression systems. At the same time, the invention of plug-ins broke the early limitations of HTML, allowing videos to be embedded and played in web pages.
In the future, users can easily embed and play videos in web pages using the
However, pages containing large photos or other images will still load slowly. So some engineers at Google have been trying new ways to further compress images while maintaining their quality and resolution. What are the preliminary results? Very optimistic. They have developed a new image format called WebP that can reduce the size of ordinary image files by 39%.
The engine that runs JavaScript code in modern browsers has also been redesigned to process code faster than ever. These fast JavaScript engines, like Google Chrome's V8 engine, have become a core part of all modern browsers. This means that the next generation of web applications based on JavaScript will be extremely useful and completely free from the constraints caused by the increasing complexity of JavaScript code.
Modern browsers like Google Chrome also use a technology called DNS pre-resolution to crawl and load web pages faster. The process of converting a URL into an IP address via a DNS lookup is called "resolution" and vice versa. Chrome uses DNS preresolution to also look up all other links on the page and preresolve those links to IP addresses behind the scenes. So when you actually click on a link on a web page, the browser can immediately take you to a new web page.
As the number of uses increases, "Chrome Browser" can also obtain information through previous visit records, so that the next time you visit a previously visited When you browse a webpage, Chrome will automatically pre-parse all relevant links and elements on the page.
Perhaps one day, browsers will be able to make predictions before loading a web page, not only knowing which links to pre-parse, but also which website elements (such as images or videos) to pre-fetch. This will make the network faster.
We hope that in the near future, browsers can load new web pages as fast as turning the pages of a book.
Today’s Internet stands on the shoulders of giants: technologists, idea experts, developers, and organizations that continue to expand the scope of innovation and share their knowledge.
The spirit of sharing is at the heart of open source.
"Open source" means that the inner workings of the software (also known as the "source code") are made available to the public, and the software is written in an open and collaborative way . Anyone can view the source code, understand how it works, tweak or add to it, and reuse it in other products or services.
Open source software plays a huge role in many aspects of the web, including modern browsers. The release of the open source browser Mozilla Firefox paved the way for many great browser innovations in the future. Google Chrome is also based on certain components of the Mozilla Firefox browser and the open source rendering engine WebKit. In the same spirit, Google has open sourced Chrome so that the world's web community can use Chrome innovations in their own products and even improve Chrome's capabilities. source code.
This open source browser is faster, simpler and more secure, and its beneficiaries are not just web developers and ordinary users. Companies like Google also benefit greatly from sharing ideas openly.
A better browser can provide users with a better online experience, and users will browse more online content after getting a better experience. Better browsers can also help businesses develop web applications with the latest advanced features, which can also improve user experience.
Browsers aren’t the only place on the web embracing open source practices. You can ask any web developer. They may use the open source Apache HTTP Server in the process of hosting and publishing websites; or they may install the Linux open source operating system on a computer. Code was developed and the above are just a few examples. The open source community will continue to work hard to improve the network and make it a broad shoulder for the next generation to stand on.
...Now we come to the 20th thing. Let's summarize.
Today’s Internet is a colorful, vivid, intuitive, pragmatic, quirky, busy, friends-gathering, fun and very practical place. Many of us live in the cloud on the Internet: we use web-based applications to read news, watch movies, chat with friends, and conduct our daily errands online in our browsers. Web applications allow us to do these things from anywhere, even on our laptops at home.
It’s all thanks to web standards like HTML, JavaScript, and CSS, as well as browser plug-ins. HTML5's new features can help developers build innovative next-generation web applications.
What other prospects are there for cloud computing?
Final summary
Use a new generation of browsers, this is the first one to bear the brunt of. Or try a new browser to see if it better meets your needs and provides you with a more enjoyable browsing experience.
The Internet will continue to develop at an amazing speed! Support cutting-edge web technologies like HTML5, CCS3, and WebGL as they help the web community envision and realize an innovative future.
Finally, try something new. New and exciting things appear on the Internet every day. Try things you never thought you could do online, such as searching for your ancestors ten generations ago or watching live broadcasts from climbing camps in the Himalayas. Internet imaging. You'll be surprised at what you find!
?
Published by Google 2010