M1 Part3
M1 Part3
The way the browser interprets and displays HTML files is specified in the HTML
and CSS specifications.
User Interface Elements
Address bar for inserting a URI
Bookmarking options
https://www.html5rocks.com/en/tutorials/internals/howbrowserswork/#The_rendering_engine
Browser's main components
The user interface: this includes the address bar, back/forward button, bookmarking menu, etc.
The browser engine: marshals actions between the UI and the rendering engine.
UI backend: used for drawing basic widgets like combo boxes and windows.
Data storage. The browser may need to save all sorts of data locally, such as cookies.
Web Servers
To dispense the web page when it is requested by web clients (browser)
Computers on which this web server program run are usually called as
servers , for hosting web.
In web hosting, the web servers enable the hosting providers to handle
multiple domains (or multiple websites) on a single server.
which makes it free and open source, available for Windows, Mac OS X, Unix, Linux, Solaris,
- IIS server has all the features just like Apache, but it is not open source.
- It is developed, and maintained by Microsoft, it works all Windows operating system platforms.
Web Browser vs Web Server
WEB BROWSER WEB SERVER
Web Browser is an Application program that Web server is a program or the computer that
displays a World wide web document provide services to web browsers
The Web browser requests the server for the The Web server accepts, approve and respond to
web documents and services. the request made by the web browser.
The web server is a software or a system which
The web browser act as an interface between
maintain the web applications, generate
server and client and displays a web document
response and accept clients data.
The web browser sends an HTTP request and The web server gets HTTP requests and send
gets an HTTP response. HTTP responses.
Website vulnerability
A website vulnerability is a weakness or misconfiguration in
a website or web application code
- allows an attacker to gain some level of control of the site, and hosting server.
- Most vulnerabilities are exploited through vulnerability scanners and botnets
Cybercriminals create specialized tools that scour the internet for certain
platforms, like WordPress or Joomla,
- to steal data, distribute malicious content, or inject defacement and spam content
Website Security Vulnerabilities
1. SQL INJECTIONS
- to use application code to access or corrupt database content.
- to create, read, update, alter, or delete data stored in the back-end database.
5. SECURITY MISCONFIGURATION
- lack of maintenance or a lack of attention to the web application configuration.
- hackers access to private data or features and can result in a complete system compromise.
An ontology is a model - listing the types of object, the relationships that connect them, and
constraints on the ways that objects and relationships can be combined.
XML (Extensible Markup Language) helps to define common syntax in semantic web.
Explored about