Search Details

Word: browsers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Attackers can take control of a Windows PC by luring users to visit websites where their browser automatically downloads specially coded image files. The tainted files are saved in the Windows Metafile (WMF) format, but can be labeled as seemingly harmless JPEG and GIF files, the most common type of images found in webpages and e-mails. Researchers say attackers use the entry point to install hidden programs that can launch pop-up ads or steal passwords and other sensitive information...

Author: /time Magazine | Title: Microsoft Confirms Windows Flaw | 12/30/2005 | See Source »

...such a small device, the 770 is loaded with features. In the original release, its system software packaged with items such as a web browser, an e-mail manager, a news reader. It's built-in media player and Internet radio are great for listening to MP3s you transfer from a memory card, or to radio programs from the net, just by pasting a station's streaming link into the player. Subsequent system updates will ship other programs, but 770 owners can already download a universal instant messenger program plus a bunch of utilities and games, all for free...

Author: /time Magazine | Title: Nokia 770 Internet Tablet | 12/28/2005 | See Source »

...browsing and instant messaging are the two areas that highlight both the strengths and weaknesses of the 770. The browser-from a "third party"-is powerful. Most sites showed up without a hitch-although it stumbled slightly with the Java on AOL's website. The screen resolution is an impressive 800x480 pixels, which means if you have great eyesight you can see entire webpages across the 4-in. widescreen. If you're having trouble, fear not, for two buttons on top will zoom the picture in and out. Although Nokia clearly thought the screen issue through, it still represents...

Author: /time Magazine | Title: Nokia 770 Internet Tablet | 12/28/2005 | See Source »

...Such programs, called spyware, run on your PC behind the scenes and perform a range of functions, from the nasty to the merely annoying. Some versions of spyware, called adware, monitor surfing habits and report back to advertisers; others insinuate themselves as browser toolbars and deliver "search results" that favor marketers. And then there are the keyloggers, which are designed to record your keystrokes as you type, potentially collecting your bank account passwords and credit card numbers and transmitting them back to a central server. "The amount of spyware out there has grown significantly, and it's gotten more malicious...

Author: /time Magazine | Title: Seven Ways to Fend Off Spyware | 12/23/2005 | See Source »

...Bump your browser's default security settings from "medium" to "high" or higher. This way you'll receive an alert any time you're about to download something, which will give you a chance to back out before the damage is done. In Internet Explorer, select Tools from the top menu; under Internet Options, choose Security, then Custom Level...

Author: /time Magazine | Title: Seven Ways to Fend Off Spyware | 12/23/2005 | See Source »

Previous | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | Next