This commit is contained in:
cotter%netscape.com 2006-07-27 14:32:38 +00:00
Родитель aa8ae17966
Коммит 27c807da09
9 изменённых файлов: 461 добавлений и 242 удалений

Просмотреть файл

@ -10,7 +10,14 @@
<a NAME="certs_first"></a>
<h1>Certificate Manager</h1>
<p><b>[intro text to come]</b></p>
<p>This section describes how to use the Certificate Manager. If you are not already viewing the Certificate Manager window, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Click Privacy and Security.
<li>Click Manage Certificates.
</ol>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -45,7 +52,7 @@
<LI>To initiate the process of backing up all the certificates stored on the software security device used by the browser, click Backup All.
<UL><p><b>Back up smart card certificates one at a time:</b> Certificates stored on any other security device, such as a smart card in a smart card reader attached to your computer, will not be backed up by the Backup All button. To back up such certificates, select them individually, then click Backup.</UL>
<p><b>Back up smart card certificates one at a time:</b> Certificates stored on any other security device, such as a smart card in a smart card reader attached to your computer, will not be backed up by the Backup All button. To back up such certificates, select them individually, then click Backup.</UL>
</UL>
@ -103,9 +110,10 @@
<p>If you select "Do not trust the authenticity of this certificate" and click OK, Certificate Manager will no longer trust this certificate for the purposes of identifying this web site or setting up an encrypted connection. If you select this setting and then attempt to visit the web site, you will see one or more warning messages before you can access the site.
<p>If you select "Trust the authenticity of this certificate" and click OK, Certificate Manager will henceforth trust this certificate for the purposes of identifying this web site or setting up an encrypted connection. If you select this setting and then attempt to visit the web site, your browser will access the site with few, if any, warnings.
In addition to specifying these settings for the certificate shown, you can specify trust settings for the certificate authority (CA) that issued the certificate—that is, you can choose to trust or not to trust different kinds of certificates issued by that certificate authority. For example, you can choose not to trust any web site certificates issued by that certificate authority.
To edit the certificate settings for the certificate authority that issued the certificate described in the window, click the Edit button.
<p>In addition to specifying these settings for the certificate shown, you can specify trust settings for the certificate authority (CA) that issued the certificate—that is, you can choose to trust or not to trust different kinds of certificates issued by that certificate authority. For example, you can choose not to trust any web site certificates issued by that certificate authority.
<p>To edit the certificate settings for the certificate authority that issued the certificate described in the Edit Certificate Settings window, click the Edit button.
<p>
[&nbsp;<A HREF="#certs_first">Return to beginning of Certificate Manager section</A>&nbsp;]
@ -173,7 +181,7 @@ To edit the certificate settings for the certificate authority that issued the c
<p><b>[text to come]</b>
<hr>
<p><i>3/19/2001</i></p>
<p><i>5/9/2001</i></p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -5,375 +5,443 @@
</HEAD>
</P>
<h1><A NAME="
"></A><A NAME="996904">
<h1><A NAME="glossary"></A><A NAME="996904">
Glossary
</A></h1><dl>
</A></h1><dl><p>
<A NAME="authentication"></A><A NAME="998782">
<B>authentication.</B>&nbsp;
</A><A NAME="1013907">
Assurance that a party to a computerized transaction is not an impostor. Authentication typically involves the use of a password, certificate, personal identification number (PIN), or other information that can be used to validate identity over a computer network. See also <a href="glossary.html#1014123">password-based authentication</a>, <a href="glossary.html#1018581">certificate-based authentication</a>, <a href="glossary.html#1021054">client authentication</a>, <a href="glossary.html#1031070">server authentication</a>.<P>
</A>
Assurance that a party to a computerized transaction is not an impostor. Authentication typically involves the use of a password, certificate, personal identification number (PIN), or other information that can be used to validate identity over a computer network. See also <a href="glossary.html#1014123">password-based authentication</a>, <a href="glossary.html#1018581">certificate-based authentication</a>, <a href="glossary.html#1021054">client authentication</a>, <a href="glossary.html#1031070">server authentication</a>.<P>
<A NAME="CA"></A><A NAME="1021395">
<B>CA.</B>&nbsp;
</A><A NAME="1021418">
See <a href="glossary.html#1020903"></a><a href="glossary.html#1020903">certificate authority (CA)</a>.<P>
</A>
<A NAME="CA certificate"></A><A NAME="1017503">
<B>CA certificate.</B>&nbsp;
</A><A NAME="1017507">
A certificate that identifies a certificate authority. See also <a href="glossary.html#1020903">certificate authority (CA)</a>, <a href="glossary.html#999541">subordinate CA</a>, <a href="glossary.html#1015631">root CA</a>.<P>
</A>
<A NAME="certificate"></A><A NAME="1018895">
<B>certificate.</B>&nbsp;
</A><A NAME="1018896">
The digital equivalent of an ID card. A certificate specifies the name of an individual, company, or other entity and certifies that a public key, which is included in the certificate, belongs to that entity. When you digitally sign a message or other data, the digital signature for that message is created with the aid of the private key that corresponds to the public key in your certificate. A certificate is issued and digitally signed by a <a href="glossary.html#1020903">certificate authority (CA)</a>. A certificate's validity can be verified by checking the CA's <a href="glossary.html#1013995">digital signature</a>. Also called digital ID, digital passport, public-key certificate X.509 certificate, and security certificate. See also <a href="glossary.html#1019178">public-key cryptography</a>.<P>
</A>
<A NAME="certificate authority (CA)"></A><A NAME="1020903">
<B>certificate authority (CA).</B>&nbsp;
</A><A NAME="1020904">
A service that issues a certificate after verifying the identity of the person or entity the certificate is intended to identify. A CA also renews and revokes certificates and generates a list of revoked certificates at regular intervals. CAs can be independent vendors (such as the CAs listed at <a href= "https://certs.netscape.com/client.html" TARGET="_blank">Certificate Authority Services</a>) or a person or organization using certificate-issuing server software (such as Netscape Certificate Management System). See also <a href="glossary.html#1018895">certificate</a>, <a href="glossary.html#1019940">certificate revocation list (CRL)</a>.<P>
A service that issues a certificate after verifying the identity of the person or entity the certificate is intended to identify. A CA also renews and revokes certificates and generates a list of revoked certificates at regular intervals. CAs can be independent vendors (such as the CAs listed at <a href= "https://certs.netscape.com/" TARGET="_blank">Client Certificates</a>) or a person or organization using certificate-issuing server software (such as Netscape Certificate Management System). See also <a href="glossary.html#1018895">certificate</a>, <a href="glossary.html#1019940">certificate revocation list (CRL)</a>.<P>
</A>
<A NAME="certificate backup password"></A><A NAME="1024655">
<B>certificate backup password.</B>&nbsp;
</A><A NAME="1024670">
A password that protects a certificate that you are backing up or have previously backed up. Certificate Manager asks you to set this password when you back up a certificate, and requests it when you attempt to restore a certificate that has previously been backed up. <P>
</A>
<A NAME="certificate-based authentication"></A><A NAME="1018581">
<B>certificate-based authentication.</B>&nbsp;
</A><A NAME="1018582">
Verification of identity based on certificates and public-key cryptography. See also <a href="glossary.html#1014123">password-based authentication</a>.<P>
</A>
<A NAME="certificate chain"></A><A NAME="1018500">
<B>certificate chain.</B>&nbsp;
</A><A NAME="1019929">
A hierarchical series of certificates signed by successive certificate authorities. A CA certificate identifies a <a href="glossary.html#1020903">certificate authority (CA)</a> and is used to sign certificates issued by that authority. A CA certificate can in turn be signed by the CA certificate of a parent CA and so on up to a <a href="glossary.html#1015631">root CA</a>. <P>
</A>
<A NAME="certificate fingerprint"></A><A NAME="1020297">
<B>certificate fingerprint.</B>&nbsp;
</A><A NAME="1020326">
A unique number associated with a certificate. The number is not part of the certificate itself but is produced by applying a mathematical function to the contents of the certificate. If the contents of the certificate change, even by a single character, the function produces a different number. Certificate fingerprints can therefore be used to verify that certificates have not been tampered with.<P>
</A>
<A NAME="Certificate Manager"></A>
<B>Certificate Manager</B>&nbsp;
</A><A NAME="1020326">
The part of the browser that allows you to view and manage certificates. To view the main Certificate Manager window, choose Preferences from the Edit menu, click Privacy/Security, then click Manage Certificates.<P>
</A>
<A NAME="certificate renewal"></A><A NAME="1031319">
<B>certificate renewal.</B>&nbsp;
</A><A NAME="1031323">
The process of renewing a <a href="glossary.html#1018895">certificate</a> that is about to expire.<P>
</A>
<A NAME="certificate revocation list (CRL)"></A><A NAME="1019940">
<B>certificate revocation list (CRL).</B>&nbsp;
</A><A NAME="1021047">
A list of revoked certificates that is generated and signed by a <a href="glossary.html#1020903">certificate authority (CA)</a>. You can download the latest CRL to your browser or to a server, then check against it to make sure that certificates are still valid before permitting their use for authentication. <P>
</A>
<A NAME="certificate store"></A><A NAME="1023462">
<B>certificate store.</B>&nbsp;
</A><A NAME="1032978">
The collection of certificates, or electronic IDs, maintained by Personal Security Manager on your behalf. These include your own certificates stored on one or more security devices, other people's certificates, web site certificates, and <a href="glossary.html#1020903"></a>CA certificates. See also <a href="glossary.html#1020903">certificate authority (CA)</a>, <a href="glossary.html#1018895">certificate</a>, <a href="glossary.html#1028962">security device</a>.<P>
</A>
<A NAME="certificate verification"></A><A NAME="1025527">
<B>certificate verification.</B>&nbsp;
</A><A NAME="1025531">
When Personal Security Manager verifies a certificate, it confirms that the digital signature was created by a CA whose own CA certificate is both present in the certificate store and marked as trusted for issuing that kind of certificate. It also confirms that the certificate being verified has not been marked as untrusted in the certificate store. Finally, if the <a href="glossary.html#1029304">Online Certificate Status Protocol (OCSP)</a> has been activated (from the Options panel under the Advanced tab), Personal Security Manager also performs an on-line check. It does so by looking up the certificate in a list of valid certificates maintained at a URL that is specified either in the certificate itself or in the OCSP Settings window. If any of these checks fail, Personal Security Manager marks the certificate as unverified and won't recognize the identity it certifies.<P>
When <a href="#Certificate Manager">Certificate Manager</a> verifies a certificate, it confirms that the digital signature was created by a CA whose own CA certificate is both on file with Certificate Manager and marked as trusted for issuing that kind of certificate. It also confirms that the certificate being verified has not itself been marked as untrusted. Finally, if the <a href="glossary.html#1029304">Online Certificate Status Protocol (OCSP)</a> has been activated, Certificate Manager also performs an on-line check. It does so by looking up the certificate in a list of valid certificates maintained at a URL that is specified either in the certificate itself or in the browser's validation preferences. If any of these checks fail, Certificate Manager marks the certificate as unverified and won't recognize the identity it certifies.<P>
</A>
<A NAME="cipher"></A><A NAME="1021048">
<B>cipher.</B>&nbsp;
</A><A NAME="1021052">
See <a href="glossary.html#1019976">cryptographic algorithm</a>.<P>
</A>
<A NAME="client"></A><A NAME="1029510">
<B>client.</B>&nbsp;
</A><A NAME="1029547">
Software (such as browser software) that sends requests to and receives information from a <a href="glossary.html#1029749">server</a>, which is usually running on a different computer. A computer on which client software runs is also described as a client.<P>
</A>
<A NAME="client authentication"></A><A NAME="1021054">
<B>client authentication.</B>&nbsp;
</A><A NAME="1014557">
The process of identifying a <a href="glossary.html#1029510">client</a> to a <a href="glossary.html#1029749">server</a>, for example with a name and password or with a <a href="glossary.html#1014561">client SSL certificate</a> and some digitally signed data. See also <a href="glossary.html#999463">Secure Sockets Layer (SSL)</a>, <a href="glossary.html#1031070">server authentication</a>.<P>
</A>
<A NAME="client SSL certificate"></A><A NAME="1014561">
<B>client SSL certificate.</B>&nbsp;
</A><A NAME="1014562">
A certificate that a <a href="glossary.html#1029510">client</a> (for example, browser software such as Netscape Communicator) presents to a <a href="glossary.html#1029749">server</a> to authenticate the identity of the client (or the identity of the person using the client) using the <a href="glossary.html#999463">Secure Sockets Layer (SSL)</a> protocol. See also <a href="glossary.html#1021054">client authentication</a>.<P>
A certificate that a <a href="glossary.html#1029510">client</a> (such as browser software) presents to a <a href="glossary.html#1029749">server</a> to authenticate the identity of the client (or the identity of the person using the client) using the <a href="glossary.html#999463">Secure Sockets Layer (SSL)</a> protocol. See also <a href="glossary.html#1021054">client authentication</a>.<P>
</A>
<A NAME="cryptographic algorithm"></A><A NAME="1019976">
<B>cryptographic algorithm.</B>&nbsp;
</A><A NAME="1019985">
A set of rules or directions used to perform cryptographic operations such as <a href="glossary.html#999078">encryption</a> and <a href="glossary.html#998999">decryption</a>. Sometimes called a <I>cipher.</I><P>
</A>
<A NAME="cryptography"></A><A NAME="1026002">
<B>cryptography.</B>&nbsp;
</A><A NAME="1026018">
The art and practice of scrambling (encrypting) and unscrambling (decrypting) information. For example, cryptographic techniques are used to scramble an unscramble information flowing between commercial web sites and your browser. See also <a href="glossary.html#1019178">public-key cryptography</a>.<P>
</A>
<A NAME="decryption"></A><A NAME="998999">
<B>decryption.</B>&nbsp;
</A><A NAME="999005">
The process of unscrambling data that has been encrypted. See also <a href="glossary.html#999078">encryption</a>.<P>
</A>
<A NAME="digital ID"></A><A NAME="999011">
<B>digital ID.</B>&nbsp;
</A><A NAME="999017">
See <a href="glossary.html#1018895">certificate</a>.<P>
</A>
<A NAME="digital signature"></A><A NAME="1013995">
<B>digital signature.</B>&nbsp;
</A><A NAME="1013996">
A code created from both the data to be signed and the private key of the signer. This code is unique for each new piece of data. Even a single comma added to a message changes the digital signature for that message. Successful validation of your digital signature by appropriate software not only provides evidence that you approved the transaction or message, but also provides evidence that the data has not changed since you digitally signed it. A digital signature has nothing to do with a handwritten signature, although it can sometimes be used for similar legal purposes. See also <a href="glossary.html#999248">nonrepudiation</a>, <a href="glossary.html#999618">tamper detection</a>.<P>
</A>
<A NAME="distinguished name (DN)"></A><A NAME="1022191">
<B>distinguished name (DN).</B>&nbsp;
</A><A NAME="1022194">
A specially formatted name that uniquely identifies the subject of a certificate.<P>
</A>
<A NAME="dual key pairs"></A><A NAME="1020489">
<B>dual key pairs.</B>&nbsp;
</A><A NAME="1020619">
Two public-private key pairs--four keys altogether--corresponding to two separate certificates. The private key of one pair is used for signing operations, and the public and private keys of the other pair are used for encryption and decryption operations. Each pair corresponds to a separate <a href="glossary.html#1018895">certificate</a>. See also <a href="glossary.html#1019178">public-key cryptography</a>.<P>
</A>
<A NAME="eavesdropping"></A><A NAME="1020620">
<B>eavesdropping.</B>&nbsp;
</A><A NAME="1013975">
Surreptitious interception of information sent over a network by an entity for which the information is not intended.<P>
</A>
<A NAME="encryption"></A><A NAME="999078">
<B>encryption.</B>&nbsp;
</A><A NAME="1024038">
The process of scrambling information in a way that disguises its meaning. For example, encrypted connections between computers make it very difficult for third-parties to unscramble, or <I>decrypt,</I> information flowing over the connection. Encrypted information can be decrypted only by someone who possesses the appropriate key. See also <a href="glossary.html#1019178">public-key cryptography</a>.<P>
</A>
<A NAME="encryption certificate"></A><A NAME="1024953">
<B>encryption certificate.</B>&nbsp;
</A><A NAME="1024978">
A certificate whose public key corresponds to a private key used for encryption only. Encryption certificates are not used for signing operations. See also <a href="glossary.html#1020489">dual key pairs</a>, <a href="glossary.html#999493">signing certificate</a>.<P>
</A>
<A NAME="encryption key"></A><A NAME="1021254">
<B>encryption key.</B>&nbsp;
</A><A NAME="1021255">
A private key used for encryption only. An encryption key and its equivalent public key, plus a <a href="glossary.html#1021282">signing key</a> and its equivalent public key, constitute a <a href="glossary.html#1020489">dual key pairs</a>.<P>
</A>
<A NAME="fingerprint"></A><A NAME="1020434">
<B>fingerprint.</B>&nbsp;
</A><A NAME="1020450">
See <a href="glossary.html#1020297">certificate fingerprint</a>.<P>
</A>
<A NAME="FIPS PUBS 140-1"></A><A NAME="1025742">
<B>FIPS PUBS 140-1.</B>&nbsp;
</A><A NAME="1025743">
Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US government standard for implementations of cryptographic modules--that is, hardware or software that encrypts and decrypts data or performs other cryptographic operations (such as creating or verifying digital signatures). Many products sold to the US government must comply with one or more of the FIPS standards.<P>
</A>
<A NAME="key"></A><A NAME="999203">
<B>key.</B>&nbsp;
</A><A NAME="999212">
A large number used by a <a href="glossary.html#1019976">cryptographic algorithm</a> to encrypt or decrypt data. A person's public key, for example, allows other people to encrypt messages to that person. The encrypted messages must be decrypted with the corresponding private key. See also <a href="glossary.html#1019178">public-key cryptography</a>.<P>
</A>
<A NAME="Lightweight Directory Access Protocol (LDAP)"></A><A NAME="1022286">
<B>Lightweight Directory Access Protocol (LDAP).</B>&nbsp;
</A><A NAME="1022287">
A protocol for accessing directory services across multiple platforms. LDAP is a simplified version of Directory Access Protocol (DAP), used to access X.500 directories. <P>
</A>
<A NAME="master key"></A><A NAME="1032598">
<B>master key.</B>&nbsp;
</A><A NAME="1032639">
A symmetric key used by Personal Security Manager to encrypt information on behalf of other applications. For example, Netscape 6 uses Personal Security Manager and your master key to encrypt email passwords, web site passwords, and other stored sensitive information. See also <a href="glossary.html#999604">symmetric encryption</a>.<P>
A symmetric key used by Certificate Manager to encrypt information. For example, Password Manager uses Certificate Mmanager and your master key to encrypt email passwords, web site passwords, and other stored sensitive information. See also <a href="glossary.html#999604">symmetric encryption</a>.<P>
</A>
<A NAME="master password"></A><A NAME="1032744">
<B>master password.</B>&nbsp;
</A><A NAME="1032748">
A password used by Certificate Manager to protect the master key and/or private keys stored on a <a href="glossary.html#1028962">security device</a>. Certificate Manager needs to access your private keys, for example, when you sign email messages or use one of your own certificates to identify yourself to a web site. It needs to access your master key when it encrypts or decrypts information on behalf of another application&#151;for example, when Password Manager needs to store or access your email password. You can set or change your master password from the My Certificates tab of the main Certificate Manager window. Each security device requires a separate master password. See also <a href="glossary.html#1015387">private key</a>, <a href="glossary.html#1032598">master key</a>.<P>
</A>
<A NAME="misrepresentation"></A><A NAME="1014057">
<B>misrepresentation.</B>&nbsp;
</A><A NAME="1014058">
Presentation of an entity as a person or organization that it is not. For example, a web site might pretend to be a furniture store when it is really just a site that takes credit card payments but never sends any goods. See also <a href="glossary.html#1014366">spoofing</a>.<P>
</A>
<A NAME="Netscape Certificate Management System"></A><A NAME="1018306">
<B>Netscape Certificate Management System.</B>&nbsp;
</A><A NAME="1018308">
A highly configurable set of software components and tools for creating, deploying, and managing certificates. You enroll with the system to obtain certificates of all kinds; the system maintains information about the certificates it issues.<P>
</A>
<A NAME="nonrepudiation"></A><A NAME="999248">
<B>nonrepudiation.</B>&nbsp;
</A><A NAME="999254">
The inability, of the sender of a message, to deny having sent the message. A regular hand-written signature provides one form of nonrepudiation. A <a href="glossary.html#1013995">digital signature</a> provides another.<P>
</A>
<A NAME="object signing"></A><A NAME="1014095">
<B>object signing.</B>&nbsp;
</A><A NAME="1014096">
A technology that allows software developers to sign Java code, JavaScript scripts, or any kind of file, and that allows users to identify the signers and control access by signed code to local system resources.<P>
</A>
<A NAME="object-signing certificate"></A><A NAME="1014097">
<B>object-signing certificate.</B>&nbsp;
</A><A NAME="1014098">
A certificate whose corresponding private key is used to sign objects such as code files. See also <a href="glossary.html#1014095">object signing</a>.<P>
</A>
<A NAME="Online Certificate Status Protocol (OCSP)"></A><A NAME="1029304">
<B>Online Certificate Status Protocol (OCSP).</B>&nbsp;
</A><A NAME="1029312">
A set of rules that Personal Security Manager follows to perform an online check of an email certificate's validity each time the certificate is used. This process involves checking the certificate against a list of valid certificates maintained at a specified web site. Your computer must be online for OCSP to work.<P>
A set of rules that Certificate Manager follows to perform an online check of a certificate's validity each time the certificate is used. This process involves checking the certificate against a list of valid certificates maintained at a specified web site. Your computer must be online for OCSP to work.<P>
</A>
<A NAME="password-based authentication"></A><A NAME="1014123">
<B>password-based authentication.</B>&nbsp;
</A><A NAME="1014124">
Confident identification by means of a name and password. See also <a href="glossary.html#998782">authentication</a>.<P>
</A>
<A NAME="Personal Security Password"></A><A NAME="1032744">
<B>Personal Security Password.</B>&nbsp;
</A><A NAME="1032748">
A password used by Personal Security Manager to protect the master key and/or private keys stored on a <a href="glossary.html#1028962">security device</a>. Personal Security Manager needs to access your private keys, for example, when you sign email messages or use one of your own certificates to identify yourself to a web site. It needs to access your master key when it encrypts or decrypts information on behalf of another application&#151;for example, when Netscape 6 needs to store or access your email password. You can set or change your personal security password from the Certificates tab in Personal Security Manager. Each security device requires a separate Personal Security Password. See also <a href="glossary.html#1015387">private key</a>, <a href="glossary.html#1032598">master key</a>.<P>
</A>
<A NAME="PKCS #11"></A><A NAME="1025194">
<B>PKCS #11.</B>&nbsp;
</A><A NAME="1025195">
The public-key cryptography standard that governs security devices such as smart cards. See also <a href="glossary.html#1028962">security device</a>, <a href="glossary.html#1027625">smart card</a>.<P>
</A>
<A NAME="PKCS #11 module"></A><A NAME="1025197">
<B>PKCS #11 module.</B>&nbsp;
</A><A NAME="1025271">
A program on your computer that manages cryptographic services such as encryption and decryption using the PKCS #11 standard. PKCS #11 modules (also called <I>cryptographic modules</I>, <I>cryptographic service providers,</I> or <I>security modules</I>) can be thought of as drivers for cryptographic devices that can be implemented in either hardware or software. A PKCS #11 module always controls one or more slots<B>,</B> which may be implemented as physical hardware slots in some form of physical reader (for example, for smart cards) or as conceptual slots in software. Each slot for a PKCS #11 module can in turn contain a <a href="glossary.html#1028962">security device</a> (also called <I>token</I>)<B>,</B> which is the hardware or software device that actually provides cryptographic services and optionally stores certificates and keys. Personal Security Manager provides a built-in PKCS #11 module. You may install additional modules on your computer to control smart card readers or other hardware devices.<P>
</A>
<A NAME="portable security password"></A><A NAME="1024655">
<B>portable security password.</B>&nbsp;
</A><A NAME="1024670">
A password that protects a certificate that you are backing up or have previously backed up. Personal Security Manager asks you to set this password when you back up a certificate, and requests it when you attempt to restore a certificate that has previously been backed up. <P>
A program on your computer that manages cryptographic services such as encryption and decryption using the PKCS #11 standard. Also called <I>cryptographic modules</I>, <I>cryptographic service providers,</I> or <I>security modules</I>, PKCS #11 modules control either hardware or software devices. A PKCS #11 module always controls one or more slots, which may be implemented as some form of physical reader (for example, for reading smart cards) or in software. Each slot for a PKCS #11 module can in turn contain a <a href="glossary.html#1028962">security device</a> (also called <I>token</I>)<B>,</B> which is the hardware or software device that provides cryptographic services and stores certificates and keys. Certificate Manager provides two built-in PKCS #11 modules. You may install additional modules on your computer to control smart card readers or other hardware devices.<P>
</A>
<A NAME="private key"></A><A NAME="1015387">
<B>private key.</B>&nbsp;
</A><A NAME="1015391">
One of a pair of keys used in public-key cryptography. The private key is kept secret and is used to decrypt data that has been encrypted with the corresponding public key.<P>
</A>
<A NAME="PSM Private Keys security device"></A><A NAME="1032045">
<B>PSM Private Keys security device.</B>&nbsp;
</A><A NAME="1032110">
The default <a href="glossary.html#1028962">security device</a> used by Personal Security Manager to store private keys associated with your certificates. In addition to private keys, the PSM Private Keys security device stores the master key used by Netscape 6 to encrypt email passwords, web site passwords, and other sensitive information. See also <a href="glossary.html#1015387">private key</a>, <a href="glossary.html#1032598">master key</a>.<P>
</A>
<A NAME="public key"></A><A NAME="1019172">
<B>public key.</B>&nbsp;
</A><A NAME="1019173">
One of a pair of keys used in public-key cryptography. The public key is distributed freely and published as part of a <a href="glossary.html#1018895">certificate</a>. It is typically used to encrypt data sent to the public key's owner, who then decrypts the data with the corresponding private key.<P>
</A>
<A NAME="public-key cryptography"></A><A NAME="1019178">
<B>public-key cryptography.</B>&nbsp;
</A><A NAME="1023765">
A set of well-established techniques and standards that allow an entity (such as a person, an organization, or hardware such as a router) to verify its identity electronically or to sign and encrypt electronic data. Two keys are involved: a <a href="glossary.html#1019172">public key</a> and a <a href="glossary.html#1015387">private key</a>. The public key is published as part of a <a href="glossary.html#1018895">certificate</a>, which associates that key with a particular identity. The corresponding private key is kept secret. Data encrypted with the public key can be decrypted only with the private key. <P>
</A>
<A NAME="public-key infrastructure (PKI)"></A><A NAME="999412">
<B>public-key infrastructure (PKI).</B>&nbsp;
</A><A NAME="1014263">
The standards and services that facilitate the use of public-key cryptography and certificates in a networked environment.<P>
</A>
<A NAME="root CA"></A><A NAME="1015631">
<B>root CA.</B>&nbsp;
</A><A NAME="1015635">
The <a href="glossary.html#1020903">certificate authority (CA)</a> with a self-signed certificate at the top of a <a href="glossary.html#1018500">certificate chain</a>. See also <a href="glossary.html#999541">subordinate CA</a>.<P>
</A>
<A NAME="Secure Sockets Layer (SSL)"></A><A NAME="999463">
<B>Secure Sockets Layer (SSL).</B>&nbsp;
</A><A NAME="999472">
A protocol that allows mutual authentication between a <a href="glossary.html#1029510">client</a> and a <a href="glossary.html#1029749">server</a> for the purpose of establishing an authenticated and encrypted connection. SSL runs above TCP/IP and below HTTP, LDAP, IMAP, NNTP, and other high-level network protocols. The new Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL. See also <a href="glossary.html#998782">authentication</a>, <a href="glossary.html#999078">encryption</a>.<P>
</A>
<A NAME="security certificate"></A><A NAME="1028900">
<B>security certificate.</B>&nbsp;
</A><A NAME="1028904">
See <a href="glossary.html#1018895">certificate</a>.<P>
</A>
<A NAME="security device"></A><A NAME="1028962">
<B>security device.</B>&nbsp;
</A><A NAME="1028963">
A hardware or software device that provides cryptographic services such as encryption and decryption and can store certificates and keys. A smart card is one example of a hardware security device. Personal Security Manager contains its own internal security device, called the <a href="glossary.html#1032045">PSM Private Keys security device</a>, that is implemented in software. Each security device is protected by its own <a href="glossary.html#1032744">Personal Security Password</a>.<P>
A hardware or software device that provides cryptographic services such as encryption and decryption and can store certificates and keys. A smart card is one example of a hardware security device. Personal Security Manager contains its own internal security device, called the <a href="glossary.html#1032045">PSM Private Keys security device</a>, that is implemented in software. Each security device is protected by its own <a href="glossary.html#1032744">master password</a>.<P>
</A>
<A NAME="security module"></A><A NAME="1029083">
<B>security module.</B>&nbsp;
</A><A NAME="1029097">
See <a href="glossary.html#1025197">PKCS #11 module</a>.<P>
</A>
<A NAME="security token"></A><A NAME="1028905">
<B>security token.</B>&nbsp;
</A><A NAME="1028909">
See <a href="glossary.html#1028962">security device</a>.<P>
</A>
<A NAME="server"></A><A NAME="1029749">
<B>server.</B>&nbsp;
</A><A NAME="1029869">
Software (such as software that serves up web pages) that receives requests from and sends information to a <a href="glossary.html#1029510">client</a>, which is usually running on a different computer. A computer on which server software runs is also described as a server.<P>
</A>
<A NAME="server authentication"></A><A NAME="1031070">
<B>server authentication.</B>&nbsp;
</A><A NAME="1031080">
The process of identifying a <a href="glossary.html#1029749">server</a> to a <a href="glossary.html#1029510">client</a> by using a <a href="glossary.html#1029874">server SSL certificate</a>. See also <a href="glossary.html#1021054">client authentication</a>, <a href="glossary.html#999463">Secure Sockets Layer (SSL)</a>.<P>
</A>
<A NAME="server SSL certificate"></A><A NAME="1029874">
<B>server SSL certificate.</B>&nbsp;
</A><A NAME="999500">
A certificate that a <a href="glossary.html#1029749">server</a> presents to a <a href="glossary.html#1029510">client</a> to authenticate the server's identity using the <a href="glossary.html#999463">Secure Sockets Layer (SSL)</a> protocol.<P>
</A>
<A NAME="signing certificate"></A><A NAME="999493">
<B>signing certificate.</B>&nbsp;
</A><A NAME="999507">
A certificate whose corresponding <a href="glossary.html#1015387">private key</a> is used to sign transmitted data, so that the receiver can verify the identity of the sender. Certificate authorities (CAs) often issue a signing certificate that will be used to sign email messages at the same time as an <a href="glossary.html#1024953">encryption certificate</a> that will be used to encrypt email messages. See also <a href="glossary.html#1020489">dual key pairs</a>, <a href="glossary.html#1013995">digital signature</a>.<P>
</A>
<A NAME="signing key"></A><A NAME="1021282">
<B>signing key.</B>&nbsp;
</A><A NAME="1021283">
A private key used for signing only. A signing key and its equivalent public key, together with an <a href="glossary.html#1021254">encryption key</a> and its equivalent public key, constitute <a href="glossary.html#1020489">dual key pairs</a>.<P>
</A>
<A NAME="slot"></A><A NAME="1025218">
<B>slot.</B>&nbsp;
</A><A NAME="1025222">
A piece of hardware, or its equivalent in software, that is controlled by a <a href="glossary.html#1025197">PKCS #11 module</a> and designed to contain a <a href="glossary.html#1028962">security device</a>. <P>
</A>
<A NAME="smart card"></A><A NAME="1027625">
<B>smart card.</B>&nbsp;
</A><A NAME="1027626">
A small device, typically about the size of a credit card, that contains a microprocessor and is capable of storing cryptographic information (such as keys and certificates) and performing cryptographic operations. Smart cards use the <a href="glossary.html#1025194">PKCS #11</a> standard. A smart card is one kind of <a href="glossary.html#1028962">security device</a>. <P>
</A>
<A NAME="software security device"></A><A NAME="1032045">
<B>software security device.</B>&nbsp;
</A><A NAME="1032110">
The default <a href="#security device">security device</a> used by Certificate Manager to store private keys associated with your certificates. In addition to private keys, the software security device stores the master key used by Password Manager to encrypt email passwords, web site passwords, and other sensitive information. See also <a href="glossary.html#1015387">private key</a>, <a href="glossary.html#1032598">master key</a>, and <a href="#Password Manager">Password Manager</a><P>
</A>
<A NAME="spoofing"></A><A NAME="1014366">
<B>spoofing.</B>&nbsp;
</A><A NAME="1014367">
Pretending to be someone else. For example, a person can pretend to have the email address <FONT FACE="courier, courier new, monospace">jdoe@mozilla.com</FONT>, or a computer can identify itself as a site called <FONT FACE="courier, courier new, monospace">www.mozilla.com</FONT> when it is not. Spoofing is one form of <a href="glossary.html#1014057">misrepresentation</a>.<P>
</A>
<A NAME="SSL"></A><A NAME="999533">
<B>SSL.</B>&nbsp;
</A><A NAME="999539">
See <a href="glossary.html#999463">Secure Sockets Layer (SSL)</a>. <P>
</A>
<A NAME="subject"></A><A NAME="1013880">
<B>subject.</B>&nbsp;
</A><A NAME="1013881">
The entity (such as a person, organization, or router) identified by a <a href="glossary.html#1018895">certificate</a>. In particular, the subject field of a certificate contains the certified entity's <a href="glossary.html#1021328">subject name</a> and other characteristics.<P>
</A>
<A NAME="subject name"></A><A NAME="1021328">
<B>subject name.</B>&nbsp;
</A><A NAME="1021338">
A <a href="glossary.html#1022191">distinguished name (DN)</a> that uniquely describes the <a href="glossary.html#1013880">subject</a> of a <a href="glossary.html#1018895">certificate</a>.<P>
</A>
<A NAME="subordinate CA"></A><A NAME="999541">
<B>subordinate CA.</B>&nbsp;
</A><A NAME="999591">
A <a href="glossary.html#1020903">certificate authority (CA)</a> whose certificate is signed by another subordinate CA or by the root CA. See also <a href="glossary.html#1018500">certificate chain</a>, <a href="glossary.html#1015631">root CA</a>.<P>
</A>
<A NAME="symmetric encryption"></A><A NAME="999604">
<B>symmetric encryption.</B>&nbsp;
</A><A NAME="999625">
An encryption method that uses a single cryptographic key to both encrypt and decrypt a given message.<P>
</A>
<A NAME="tamper detection"></A><A NAME="999618">
<B>tamper detection.</B>&nbsp;
</A><A NAME="999631">
A mechanism ensuring that data received in electronic form has not been tampered with; that is, that the data received corresponds entirely with the original version of the same data.<P>
</A>
<A NAME="TLS"></A><A NAME="1027427">
<B>TLS.</B>&nbsp;
</A><A NAME="1027428">
See <a href="glossary.html#999463">Secure Sockets Layer (SSL)</a>.<P>
</A>
<A NAME="token"></A><A NAME="1024528">
<B>token.</B>&nbsp;
</A><A NAME="1024586">
See <a href="glossary.html#1028962">security device</a>.<P>
</A>
<A NAME="trust"></A><A NAME="1019748">
<B>trust.</B>&nbsp;
</A><A NAME="1020186">
Confident reliance on a person or other entity. In the context of <a href="glossary.html#999412">public-key infrastructure (PKI)</a>, trust usually refers to the relationship between the user of a certificate and the <a href="glossary.html#1020903">certificate authority (CA)</a> that issued the certificate. If you use Personal Security Manager to specify that you trust a CA, Personal Security Manager trusts valid certificates issued by that CA unless you specify otherwise in the settings for individual certificates. You use the Authorities panel of the Certificates tab in Personal Security Manager to specify the kinds of certificates you trust or don't trust different CAs to issue. <P>
Confident reliance on a person or other entity. In the context of <a href="glossary.html#999412">public-key infrastructure (PKI)</a>, trust usually refers to the relationship between the user of a certificate and the <a href="glossary.html#1020903">certificate authority (CA)</a> that issued the certificate. If you use Certificate Manager to specify that you trust a CA, Certificate Manager trusts valid certificates issued by that CA unless you specify otherwise in the settings for individual certificates. You use the Authorities tab in Certificate Manager to specify the kinds of certificates you do or don't trust specific CAs to issue. <P>
</A>
<A NAME="1028719">
<B></B><a href="glossary.html#1028962"></a><P>
</A>
</dl>
<BR>
&copy; Copyright 2000 Netscape Communications Corporation
<hr>
<p>
&copy; Copyright 2001 Netscape Communications Corporation
</FONT> </CENTER>
<BR>

Просмотреть файл

@ -64,11 +64,11 @@
<p>You can use the Passwords preferences panel to set how often the browser requires your Master Password. Here are some things you should consider when selecting these options:
<ul>
<LI><B>First time sensitive information (such as your certificate) is requested.</B> If you work in an office with strong physical security measures or if you feel that the consequences of somebody else using your computer to impersonate you are not extreme, click this radio button. This setting causes Personal Security Manager to request your Personal Security Password only the first time it is required after you launch your browser. Personal Security Manager will not request it again until after you exit and relaunch your browser. This setting provides the lowest level of protection.
<LI><B>First time sensitive information (such as your certificate) is requested.</B> If you work in an office with strong physical security measures or if you feel that the consequences of somebody else using your computer to impersonate you are not extreme, click this radio button. This setting causes Certificate Manager to request your master password only the first time it is required after you launch your browser. Certificate Manager will not request it again until after you exit and relaunch your browser. This setting provides the lowest level of protection.
<LI><B>Every time sensitive information (such as your certificate) is requested.</B> If you are very concerned about the possibility that somebody else might be able to use your computer to impersonate you, click this radio button. This setting ensures that Personal Security Manager will never access the private key database without first requesting your Personal Security Password. This setting provides the highest level of protection.
<LI><B>Every time sensitive information (such as your certificate) is requested.</B> If you are very concerned about the possibility that somebody else might be able to use your computer to impersonate you, click this radio button. This setting ensures that Certificate Manager will never access the private key database without first requesting your master password. This setting provides the highest level of protection.
<LI><B>After </B><I>blank</I><B> minutes of inactivity on an encrypted site.</B> If you are somewhat concerned about the possibility that somebody else might be able to use your computer to impersonate you, but not enough to type in your Master Password at frequent intervals, click this radio button and fill in the box with a value you feel comfortable with (for best protection, this should be a fairly low number of minutes, such as 20). This setting is appropriate if you sometimes send or receive confidential information to or from web sites that support encryption. <B>Note that this setting provides little protection against someone using your computer to send a signed email message in your name. </B>
<LI><B>After </B><I>blank</I><B> minutes of inactivity on an encrypted site.</B> If you are somewhat concerned about the possibility that somebody else might be able to use your computer to impersonate you, but not enough to type in your master password at frequent intervals, click this radio button and fill in the box with a value you feel comfortable with (for best protection, this should be a fairly low number of minutes, such as 20). This setting is appropriate if you sometimes send or receive confidential information to or from web sites that support encryption. <B>Note that this setting provides little protection against someone using your computer to send a signed email message in your name. </B>
</ul>
@ -83,15 +83,15 @@
<h2>Change Master Password</h2>
<p>A Master Password protects a security device, which is a software or hardware device that stores sensitive information associated with your identity, such as keys or certificates. For example, the browser has a default software security device, and you can also use external security devices, such as smart cards, if your computer is configured to use them.
<p>A master password protects a security device, which is a software or hardware device that stores sensitive information associated with your identity, such as keys or certificates. For example, the browser has a built-in Software Security Device, and you can also use external security devices, such as smart cards, if your computer is configured to use them.
<p>The Master Password for the browser's internal software security device also protects your master key. Your master key is used to encrypt sensitive information such as email passwords, web site passwords, and other data stored by the Password Manager and Forms Manager. If someone uses your computer who knows or can guess the Master Password for the software security device, that person may be able to access web sites while pretending to be you. This can be dangerous&#151;for example, if you manage your financial accounts over the Internet. Therefore, it's important to select a Master Password that is difficult to guess.
<p>The master password for the browser's buildt-in Software Security Device also protects your master key. Your master key is used to encrypt sensitive information such as email passwords, web site passwords, and other data stored by the Password Manager and Forms Manager. If someone uses your computer who knows or can guess the master password for the software security device, that person may be able to access web sites while pretending to be you. This can be dangerous&#151;for example, if you manage your financial accounts over the Internet. Therefore, it's important to select a master password that is difficult to guess.
<p><b>[Discussion of new password quality meter]</b></p>
<p>It's also important to record your Master Password in a safe place&#151;and<I> not </I>anywhere that's easily accessible to someone else. If you forget this password, you may not be able to access important information, such as web sites that require passwords or certificates stored on your computer. For more information about the consequences of losing your Master Password, see <a href="xxx">link to troubleshooting section on loosing your password</a>.</P>
<p>It's also important to record your master password in a safe place&#151;and<I> not </I>anywhere that's easily accessible to someone else. If you forget this password, you may not be able to access important information, such as web sites that require passwords or certificates stored on your computer. </P>
<p>Note that each security device requires a separate Master Password. For example, if you are using one or more smart cards to store some of your certificates, you must set a separate Master Password for each one. </P>
<p>Note that each security device requires a separate master password. For example, if you are using one or more smart cards to store some of your certificates, you must set a separate master password for each one. </P>
<p>
[&nbsp;<A HREF="#passwords_first">Return to beginning of Passwords section</A>&nbsp;]
@ -101,7 +101,7 @@
<hr>
<p><i>2/12/2001</i></p>
<p><i>5/10/2001</i></p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -1,6 +1,6 @@
<html>
<head>
<title>Understanding Privacy</title>
<title>Privacy on the Internet</title>
<link rel="stylesheet" href="chrome://help/locale/content_style.css" type="text/css">
@ -13,7 +13,7 @@
<p>The Internet is a public network of millions of computers, all sharing information. On the Internet, communications move back and forth across public lines and through numerous connections. As with all public lines, eavesdropping is possible.</p>
<p>Fortunately, your browser contains features that safeguard security. There are also several things you personally can do to safeguard your privacy and security while on the Internet. Click one of the links below to learn more.</p>
<p>This document provides some background information about privacy on the Internet. It also describes several things you can do to safeguard your own privacy. Click any of the links below to learn more.</p>
<p>In addition to the information in this document, you can always find the latest news about security at Netscape's <a href="http://home.netscape.com/security/index.html" target="_blank">Security Center</a>. For more information about privacy and security, including information about viruses, secure email, safe online shopping and banking, and safe surfing for children, see
<a href="http://home.netscape.com/security/basics/index.html?cp=sciln" target="_blank">Understanding Security</a>, a document located at the Security Center.
@ -54,7 +54,7 @@
</ul>
<p>A web page <b>can't</b> find out your e-mail address, name, or any
other personal information unless you explicitly provide it.
other personal information unless you explicity provide it.
You are in control---nobody can obtain personal information about
you unless you allow it.
@ -130,7 +130,7 @@ for potential dog owners who do not have valid dog licenses.
<h3>How Do Sites Use Cookie Information?</h3>
<p>Web sites can use cookie information to tailor their presentations to you, and advertisers can use such information to target online ads to your interests and buying information. Reputable web sites have privacy policies that describe how they use the information they receive.
<p>Web sites can use cookie information to tailor their presentations to you, and advertisers can use such information to target online ads to your interests and buying information. Reputable web sites have prvacy policies that describe how they use the information they receive.
<p>When in doubt, always check a web site's privacy policy before permitting a cookie to be set, and before providing any personal information (such as your name and email address).</p>
@ -210,10 +210,10 @@ search engine to find them---try search words such as "anonymous" and
<hr>
<p><i>10/6/00</i></p>
<p><i>5/9/2001</i></p>
<hr>
<p>Copyright &copy; 1994-2000 Netscape Communications Corporation.</p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body>
</html>

Просмотреть файл

@ -29,7 +29,7 @@
<a NAME="Manage_Certificates"></a>
<h3>Manage Certificates</h3>
<p>Certificates are the digital equivalent of ID cards--they help other people
<p>Certificates are the digital equipvalent of ID cards--they help other people
identify you, and they help you identify other people, web sites, and organizations.
<p>To examine or configure the certificates you have on file, click Manage Certificates.

Просмотреть файл

@ -40,10 +40,9 @@ between them. The Transport Layer Security (TLS) protocol is an IETF standard ba
SSL. TLS 1.0 can be thought of as SSL 3.1.
<p>You should normally leave both SSL checkboxes and the TLS checkbox in the Options panel
selected to ensure that both older and newer web servers can support authentication and
encryption with Personal Security Manager.
selected to ensure that both older and newer web servers can work with Certificate Manager.
<p>Some servers that do not implement SSL correctly cannot negotiate the SSL handshake with client software (such as Personal Security Manager) that supports TLS. To allow Personal Security Manager to use SSL with such TLS-intolerant servers, click the "Enable TLS" checkbox to deselect it.
<p>Some servers that do not implement SSL correctly cannot negotiate the SSL handshake with client software (such as Certificate Manager) that supports TLS. To allow Certificate Manager to use SSL with such TLS-intolerant servers, click the "Enable TLS" checkbox to deselect it.
<p>&nbsp;</p>
<a NAME="SSL_Warnings"></a>
@ -55,7 +54,7 @@ window is locked. If the connection is not encrypted, the lock icon is unlocked.
<p>For many people, the lock icon provides sufficient information about a page's
encryption status. If you want additional warnings, you can select one or more of
the warning checkboxes in the Navigator section of the Applications tab. Think
the warning checkboxes in SSL Settings preferences panel. Think
carefully about whether you want such warnings, since they can be annoying.
<p>These are the choices you can make about Navigator warnings:</P>
@ -66,7 +65,7 @@ that supports encryption, select one or both of "Entering a site that supports
encryption" and "Leaving a site that supports encryption."
<LI>If you want to be warned when you are viewing pages containing a mix
of encrypted and unencrypted material (a situation in which the lock icon is unlocked),
select "Viewing a page with an encrypted/unencrypted mix
select "Viewing a page with an encrypted/unencrypted mix"
<LI>If you want some assurance that you won't inadvertently send sensitive
information to a web site that doesn't provide an encrypted connection, select
"Sending unencrypted information to a site." You may want to select this option
@ -90,7 +89,7 @@ requests one, click Select Manually.
</p>
<hr>
<p><i>3/22/2001</i></p>
<p><i>5/10/2001</i></p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -268,78 +268,13 @@
</nc:subheadings>
</rdf:Description>
<!-- INSTANT MESSAGING HELP CONTENT -->
<rdf:Description about="urn:root">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="im-doc" nc:name="Using Netscape Instant Messenger" nc:link="chrome://help/locale/im_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#im-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="im-doc-what" nc:name="What Is Instant Messenger?" nc:link="chrome://help/locale/im_help.html#im_whats"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#im-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="im-doc-setup" nc:name="Setting Up" nc:link="chrome://help/locale/im_help.html#im_setup"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#im-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="im-doc-reg" nc:name="Registering New Screen Names" nc:link="chrome://help/locale/im_help.html#im_regist"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#im-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="im-doc-signon" nc:name="Signing On" nc:link="chrome://help/locale/im_help.html#im_signon"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#im-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="im-doc-screen" nc:name="Using Multiple Screen Names" nc:link="chrome://help/locale/im_help.html#im_multnam"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#im-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="im-doc-prefs" nc:name="Setting Preferences" nc:link="chrome://help/locale/im_help.html#im_prefs"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#im-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li><rdf:Description ID="im-doc-settings" nc:name="Specifying Connection Settings" nc:link="chrome://help/locale/im_help.html#im_connect"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- PRIVACY HELP CONTENT -->
<rdf:Description about="urn:root">
<nc:subheadings>
<rdf:Seq>
<rdf:li> <rdf:Description ID="privacy-doc" nc:name="Understanding Privacy and Security" nc:link="chrome://help/locale/privacy_help.html"/> </rdf:li>
<rdf:li> <rdf:Description ID="privacy-doc" nc:name="Privacy on the Internet" nc:link="chrome://help/locale/privacy_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
@ -392,74 +327,15 @@
<rdf:Description about="#privacy-doc">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="privacy-doc-certs" nc:name="Understanding Certificates"
nc:link="chrome://help/locale/cert_concepts_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#privacy-doc-certs">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="privacy-doc-certs-issues" nc:name="Internet Security Issues"
nc:link="chrome://help/locale/cert_concepts_help.html#Internet_Security_Issues"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#privacy-doc-certs">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="privacy-doc-certs-encryption" nc:name="Encryption and Decryption"
nc:link="chrome://help/locale/cert_concepts_help.html#Encryption_and_Decryption"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#privacy-doc-certs">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="privacy-doc-certs-crypto" nc:name="Public-Key Cryptography"
nc:link="chrome://help/locale/cert_concepts_help.html#Public-Key_Cryptography"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#privacy-doc-certs">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="privacy-doc-certs-digsig" nc:name="Digital Signatures"
nc:link="chrome://help/locale/cert_concepts_help.html#Digital_Signatures"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#privacy-doc-certs">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="privacy-doc-certs-certs" nc:name="Certificates"
nc:link="chrome://help/locale/cert_concepts_help.html#Certificates"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- USING CONTENT -->
<!-- USING PRIVACY FEATURES CONTENT -->
<rdf:Description about="urn:root">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="using-help" nc:name="Using Security and Privacy Features"
<rdf:Description ID="using-help" nc:name="Using Privacy Features"
nc:link="chrome://help/locale/using_priv_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
@ -509,7 +385,11 @@
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#using-help">
<!-- USING CERTIFICATES CONTENT -->
<rdf:Description about="urn:root">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
@ -533,8 +413,8 @@
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="using-help-certs-get" nc:name="Check Security For a Web Page"
nc:link="chrome://help/locale/using_certs_help.html#using_certs_get"/> </rdf:li>
<rdf:Description ID="using-help-certs-info" nc:name="Check Security For a Web Page"
nc:link="chrome://help/locale/using_certs_help.html#using_certs_info"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
@ -553,7 +433,7 @@
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="using-help-certs-devices" nc:name="Manage Smart Cards and Other Security Devices"
<rdf:Description ID="using-help-certs-devices" nc:name="Manage Smart Cards and Other Security Devices"
nc:link="chrome://help/locale/using_certs_help.html#using_certs_devices"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
@ -593,6 +473,57 @@
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#ssl-page-info-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="ssl-page-info-help-nover_noencrypt" nc:name="Identity Not Verified/Connection Not Encrypted"
nc:link="chrome://help/locale/ssl_page_info_help.html#Not_Verified_Not Encrypted"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#ssl-page-info-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="ssl-page-info-help-ver_encrypt" nc:name="Identity Verified/Connection Encrypted"
nc:link="chrome://help/locale/ssl_page_info_help.html#Verified_Encrypted"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#ssl-page-info-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="ssl-page-info-help-cver-encrypt" nc:name="Identity Conditionally Verified/Connection Encrypted"
nc:link="chrome://help/locale/ssl_page_info_help.html#Conditionally_Verified_Encrypted"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#ssl-page-info-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="ssl-page-info-help-ver-noencrypt" nc:name="Identity Verified/Connection Not Encrypted"
nc:link="chrome://help/locale/ssl_page_info_help.html#Verified_Not Encrypted"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#ssl-page-info-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="ssl-page-info-help-cver-noencrypt" nc:name="Identity Conditionally Verified/Connection Not Encrypted"
nc:link="chrome://help/locale/ssl_page_info_help.html#Conditionally_Verified_Not_Encrypted"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
@ -840,11 +771,94 @@
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#cert-dialog-help-website">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="cert-dialog-help-website-new" nc:name="New Web Site Certificate"
nc:link="chrome://help/locale/cert_dialog_help.html#New_Web_Site_Certificate"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#cert-dialog-help-website">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="cert-dialog-help-website-expired" nc:name="Expired Web Site Certificate"
nc:link="chrome://help/locale/cert_dialog_help.html#Expired_Web_Site_Certificate"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#cert-dialog-help-website">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="cert-dialog-help-website-notyetvalid" nc:name="Web Site Certificate Not Yet Valid"
nc:link="chrome://help/locale/cert_dialog_help.html#Web_Site_Certificate_Not_Yet_Valid"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<rdf:Description about="#cert-dialog-help-website">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="cert-dialog-help-website-xname" nc:name="Unexpected Certificate Name"
nc:link="chrome://help/locale/cert_dialog_help.html#Unexpected_Certificate_Name"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- PREFERENCES CONTENT -->
<rdf:Description about="urn:root">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="prefs-help" nc:name="Preferences"
nc:link="chrome://help/locale/prefs_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- APPEARANCE SETTINGS CONTENT -->
<rdf:Description about="#prefs-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="appear-cs-help" nc:name="Appearance Settings"
nc:link="chrome://help/locale/appear_cs_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- NAVIGATOR SETTINGS CONTENT -->
<rdf:Description about="#prefs-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="nav-cs-help" nc:name="Navigator Settings"
nc:link="chrome://help/locale/nav_cs_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- PRIVACY AND SECURITY SETTINGS CONTENT -->
<rdf:Description about="urn:root">
<rdf:Description about="#prefs-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
@ -939,6 +953,46 @@
</nc:subheadings>
</rdf:Description>
<!-- COMPOSER SETTINGS CONTENT -->
<rdf:Description about="#prefs-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="composer_cs-help" nc:name="Composer Settings"
nc:link="chrome://help/locale/composer_cs_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- MAIL & NEWSGROUPS SETTINGS CONTENT -->
<rdf:Description about="#prefs-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="mail-cs-help" nc:name="Mail and Newsgroups Settings"
nc:link="chrome://help/locale/mail_cs_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- ADVANCED SETTINGS CONTENT -->
<rdf:Description about="#prefs-help">
<nc:subheadings>
<rdf:Seq>
<rdf:li>
<rdf:Description ID="advanced-cs-help" nc:name="Advanced Settings"
nc:link="chrome://help/locale/advanced_cs_help.html"/> </rdf:li>
</rdf:Seq>
</nc:subheadings>
</rdf:Description>
<!-- GLOSSARY CONTENT -->

Просмотреть файл

@ -1,6 +1,6 @@
<html>
<head>
<title>Browser Help</title>
<title>Using Certificates</title>
<link rel="stylesheet" href="chrome://help/locale/content_style.css" type="text/css">
@ -11,11 +11,18 @@
<a NAME="using_certs_first"></a>
<h1>Using Certificates</h1>
<p>A certificate is the digital equivalent of an ID card. Just as you may have several ID cards for different purposes, such as a driver's license, an employee ID card, or a credit card, you can have several certificates that are used to identify you for different purposes.</p>
<p>A certificate is the digital equivalent of an ID card. Just as you may have several ID cards for different purposes, such as a driver's license, an employee ID card, or a credit card, you can have several different certificates that identify you for different purposes.</p>
<P>In addition to certificates that identify you, your browser can keep certificates on file that identify other people or organizations. These allow you to control, for example, which web sites you trust for financial transactions.</P>
<P>This section describes how to use the Certificate Manager to work with the certificates you have on file. To open the Certificate Manager, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Click Privacy and Security.
<li>Click Manage Certificates.
</ol>
<p>When you are using Certificate Manager windows, you can obtain more detailed instructions by clicking the Help button in the lower-right corner of each window.</P>
<P>This section describes how to examine and configure the certificates you have on file. For an overview of the way certificates work, see <b>[xref to Certificates and Network Security].</b> When you are using Certificate Manager windows, you can also obtain more detailed instructions by clicking the Help button in the lower-right corner of each window.</P>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -36,11 +43,22 @@
<a NAME="using_certs_get"></a>
<h2>Get Your Own Certificate</h2>
<P>Much like a credit card or a driver's license, a <i>certificate</i> is a form of identification you can use to identify yourself over the Internet and other networks. Like other commonly used personal IDs, a certificate is typically issued by an organization with recognized authority to issue such identification. An organization that issues certificates is called a <i>certificate authority.</i>
<P>Much like a credit card or a driver's license, a certificate is a form of identification you can use to identify yourself over the Internet and other networks. Like other commonly used personal IDs, a certificate is typically issued by an organization with recognized authority to issue such identification. An organization that issues certificates is called a certificate authority (CA).
<p>Once you have obtained a certificate, you store it in a <i>security device.</i> Your browser comes with its own built-in software security device. A security device can also be a piece of hardware, such as a smart card.</p>
<p>You can obtain certificates that identify you from public CAs, from system administrators or special CAs within your organization, or from web sites offering specialized services that require a means of identification more reliable that your name and password.
<p>Just as the requirements for a driver's license vary depending on the type of vehicle you want to drive, the requirements for obtaining a certificate vary depending on what you want to use it for. In some cases getting a certificate may be as easy as going to a web site, entering some personal information, and automatically downloading the certificate into your browser. In other cases you may have to go through several steps.
<p>You can obtain a certificate today by visiting the URL for a certificate authority and following the on-screen instructions. For a list of certificate authorities, see the online document <a href="https://certs.netscape.com/" TARGET="_blank">Client Certificates</a>. </p>
<p>Once you obtain a certificate, it is automatically stored in a <a href="glossary.html#security device">security device</a>. Your browser comes with its own built-in software security device. A security device can also be a piece of hardware, such as a smart card.</p>
<p>Like a driver's license or a credit card, a certificate is a valuable form of identification that can be abused if it falls into the wrong hands. Once you've obtained a certificate that identifies you, you should protect it in two ways: by backing it up and by setting your <a href="glossary.html#master password">master password</a>.
<p>When you first obtain a certificate, you may be prompted to back it up. If you haven't yet created a master password, you will be asked to create one.
<p>For detailed information about backing up a certificate and setting your master password, see <a href="certs_help.html#My_Certificates">My Certificates</a>.
<p>To get a certificate, go to the URL for any certificate authority and follow the on-screen instructions for obtaining a certificate. For a list of certificate authorities, see <a href="https://certs.netscape.com/" TARGET="_blank">Client Certificates</a>. </p>
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
@ -52,8 +70,13 @@
<p><b>[describes the lock icon and how to open Page Info for a given web page.]</b></p>
<p>
[&nbsp;<A HREF="#certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
</p>
@ -61,8 +84,17 @@
<a NAME="using_certs_manage"></a>
<h2>Manage Certificates</h2>
<p><b>[describes how to open the Cert Manager.]</b></p>
<p>You can use the Certificate Manager to manage the certificates you have available. Certificates may be stored on your computer's hard disk or on smart cards or other security devices attached to your computer.</p>
<p>To open the Certificate Manager, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Click Privacy/Security.
<li>Click Manage Certificates.
</ol>
<p>The sections that follow describe some of the tasks you can use the Certificate Manager to perform. For more detailed instructions about using any Certificate Manager window, click the Help button for that window.
<p><a HREF="#using_certs_my">Manage Certificates that Identify You</a><br>
<a HREF="#using_certs_sites">Manage Certificates that Identify Web Sites</a><br>
@ -72,7 +104,23 @@
<a NAME="using_certs_my"></a>
<H3>Manage Certificates that Identify You</H3>
<p><b>[Describes how to open the Cert Manager to the first tab, how to select one or more certs, and how to examine, back up, delete, and restore certs.]</b></p>
<p>When you first open the Certificate Manager, you'll notice that it has several tabs across the top of its window. The first tab is called My Certificates, and it displays the certificates your browser has on file that identify you. Your certificates are listed under the names of the organizations that issued them.
<p>To perform an action on one or more certificates, click the entry for the certificate (or Shift-click to select more than one), then click the View, Backup, or Delete button. Each of these buttons brings up another window that allows you to perform the action. Click the Help button in any window to obtain more information about using that window.
<p>The other buttons in the My Certificates tab don't require you to select a certificate first. You can use them to perform these actions:
<ul>
<li><b>Restore.</b> Click this button if you want to restore a certificate that you've previously backed up or transferred from one machine to another.
<li><b>Backup All.</b> Click this button to back up all your own certificates stored in the browser's software security device. Note that certificates stored on smart cards cannot be backed up by this method. Instead, you must select them one by one, then click Backup.
<li><b>Change Master Password.</b> Each security device has a master password that protects the information it contains, including your certificates. The master password for the browser's software security device can also be used to protect information stored by the Password Manager. For information about the Password Manager, see <a href="using_priv_help.html#using_password">Using the Password Manager</a>.
</ul>
<p>For more details about any of these tasks, click the Help button in any Certificate Manager window or see <a href="certs_help.html#My_Certificates">My Certificates</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
@ -82,7 +130,19 @@
<a NAME="using_certs_sites"></a>
<H3>Manage Certificates that Identify Web Sites</H3>
<p><b>[Describes how to open the Cert Manager to the third tab, how to select one or more certs, how to edit the settings for selected web site certs, and how to delete selected web site certs.]</b></p>
<p>Some web sites use certificates to identify themselves. Such identification is required before the web site can encrypt information transferred between the site and your computer (or vice versa), so that nobody can read the data while in transit.
<p>If the URL for a web site begins with <tt>https://</tt>, the web site has a certificate. If you visit such a web site and its certificate was issued by a CA that your browser doesn't know about or doesn't trust, you will be asked whether you want to accept web site's certificate. When you accept a new web site certificate, the Certificate Manager adds it to its list of web site certificates.
<p>To view all the web site certificates available to your browser, click the tab labeled Web Site Certificates at the top of the Certificate Manager window.
<p>To perform an action on one or more web site certificates, click the entry for the certificate (or Shift-click to select more than one), then click the View, Edit, or Delete button. Each of these buttons brings up another window that allows you to perform the corresonding action. Click the Help button in any window to obtain more information about using that window.
<p>The Edit button allows you to specify whether your browser will trust the selected web site certificates in the future.
<p>For more details, click the Help button in any Certificate Manager window or see <a href="certs_help.html#Web_Site_Certificates">Web Site Certificates</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
@ -92,7 +152,17 @@
<a NAME="using_certs_cas"></a>
<H3>Manage Certificates that Identify Certificate Authorities</H3>
<p><b>[Describes how to open the Cert Manager to the fourth tab, how to select one or more certs, how to edit the settings for selected CA certs, and how to delete selected CA certs.]</b></p>
<p>Like other commonly used forms of ID, a certificate is issued by an organization with recognized authority to issue such identification. An organization that issues certificates is called a <a href="glossary.html#certificate authority (CA)">certificate authority (CA)</a>. A certificate that identifies a CA is called a CA certificate.
<p> Certificate Manager typically has many CA certificates on file. These CA certificates permit Certificate Manager to recognize and work with certificates issued by the corresponding CAs. However, the presence of a CA certificate in this list does <i>not</i> guarantee that the certificates it issues can be trusted. You or your system administrator must make decisions about what kinds of certificates to trust depending on your security needs.
<p>To view all the CA certificates available to your browser, click the tab labeled Web Site Certificates at the top of the Certificate Manager window.
<p>To perform an action on one or more CA certificates, click the entry for the certificate (or Shift-click to select more than one), then click the View, Edit, or Delete button. Each of these buttons brings up another window that allows you to perform the action. Click the Help button in any window to obtain more information about using that window.
<p>The Edit button allows you to view and control the trust settings for each certificate. Trust settings for a CA certificate let you to specify which kinds of certificates issued by that CA you are willing to trust.
<p>For more details, click the Help button in any Certificate Manager window or see <a href="certs_help.html#CA_Certificates">CA Certificates</a>.
<p>
[&nbsp;<A HREF="#using_certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
@ -112,9 +182,24 @@
<p>&nbsp;</p>
<a NAME="using_certs_ssl"></a>
<h2>Edit SSL Settings</h2>
<h2>View or Change SSL Settings</h2>
<p><b>[Describes how to use SSL preferences.]</b></p>
<p>The Secure Sockets Layer (SSL) protocol allows your computer to exchange information with web site computers in encrypted form--that is, the information is scrambled while in transit so that nobody else can make sense of it. SSL is also used to identify computers on the Internet by means of certificates.
<p>Transport Layer Security (TLS) is a new standard based on SSL. By default, the browser supports both SSL and TLS. This approach works for most people, because it guarantees that the browser will work with virtually all other existing software on the Internet that supports any version of SSL or TLS. However, in some circumstances system administrators or other knowledgeable persons may wish to adjust the SSL settings to fine-tune them for special security needs or to account for bugs in some older software products.
<p>You shouldn't adust the SSL settings for your browser unless you know what you're doing or have the assistance of someone else who does. If you do need to adjust them for some reason, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy and Security category, select SSL. (If no options are visible under Privacy and Security, click its triangle to expand the list.)
</ol>
<p>For more details, click the Help button in the SSL Settings panel or see <a href="ssl_help.html">SSL Settings</a>.
</A>
</p>
<p>
[&nbsp;<A HREF="#certs_first">Return to beginning of Using Certificates section</A>&nbsp;]
@ -122,7 +207,7 @@
<p>&nbsp;</p>
<a NAME="using_certs_validation"></a>
<h2>Edit Validation Settings</h2>
<h2>View or Change Validation Settings</h2>
<p><b>[Describes how use Validation Preferences.]</b></p>
@ -133,7 +218,7 @@
<hr>
<p><i>2/12/2001</i></p>
<p><i>5/9/2001</i></p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -1,6 +1,6 @@
<html>
<head>
<title>Using Security and Privacy Features</title>
<title>Using Privacy Features</title>
<link rel="stylesheet" href="chrome://help/locale/content_style.css" type="text/css">
@ -9,9 +9,12 @@
<body bgcolor="white">
<a NAME="using_maintain"></a>
<h1>Using Security and Privacy Features</h1>
<h1>Using Privacy Features</h1>
<p>The Internet is a public network of millions of computers, all sharing information. On the Internet, communications move back and forth across public lines and through numerous connections. As with all public lines, eavesdropping is possible.</p>
<p>Fortunately, your browser contains features that safeguard security. Click one of the links below to learn more.</p>
<p><b>[intro text]</b>.
<p>&nbsp;</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
@ -354,10 +357,10 @@ A domain cookie is sent back to any site that's in the same domain as the site t
<td class="inthissections">
<p>In this section:</p>
<p><a href="#encrypt_on">Encrypting Stored Sensitive Information</a></p>
<p><a href="#encrypt_master">Setting a Personal Security Password</a></p>
<p><a href="#encrypt_change">Changing Your Personal Security Password</a></p>
<p><a href="#encrypt_logout">Logging Out of Your Personal Security Password</a></p>
<p><a href="#encrypt_forget">What to Do If You Forget Your Personal Security Password</a></p>
<p><a href="#encrypt_master">Setting a Master Password</a></p>
<p><a href="#encrypt_change">Changing Your Master Password</a></p>
<p><a href="#encrypt_logout">Logging Out of Your Master Password</a></p>
<p><a href="#encrypt_forget">What to Do If You Forget Your Master Password</a></p>
</td>
</tr>
</table>
@ -371,40 +374,40 @@ A domain cookie is sent back to any site that's in the same domain as the site t
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Advanced category, choose Passwords.
<li>Under the Privacy and Security category, choose Passwords.
<li>In the Encrypting versus Obscuring section, select "Use encryption when storing sensitive data." Remove the checkmark to turn encryption off.
<li>Click OK. A new dialog box appears and leads you through the process of choosing a Personal Security password.
<li>Click OK. A new dialog box appears and leads you through the process of choosing a master password.
</ol>
<p>&nbsp;</p>
<a NAME="encrypt_master"></a>
<h2>Setting a Personal Security Password</h2>
<h2>Setting a Master Password</h2>
<p>If you choose encryption, you'll need a Personal Security Password. You can set your Personal Security Password by using the Personal Security Manager. With encryption selected, you'll be asked for your Personal Security Password at least once during a Netscape 6 session in which you access any of your stored sensitive information.</p>
<p>If you choose encryption, you'll need a master password. With encryption selected, you'll be asked for your master password at least once during a browser session in which you access any of your stored sensitive information.</p>
<p>If you choose encryption, but don't already have a Personal Security Password, you'll be prompted to create one the first time you try to save or retrieve your sensitive information.</p>
<p>If you choose encryption, but don't already have a master password, you'll be prompted to create one the first time you try to save or retrieve your sensitive information.</p>
<p>&nbsp;</p>
<a NAME="encrypt_change"></a>
<h2>Changing Your Personal Security Password</h2>
<h2>Changing Your Master Password</h2>
<ol>
<li>Open the Tasks menu, choose Privacy and Security, and then choose Password Manager.</li>
<li>Select Change Personal Security Password from the submenu. You see the Personal Security Manager.
<li>Enter your current Personal Security Password and click OK.</li>
<li>Enter your new Personal Security Password, and retype it to confirm the spelling.</li>
<li>Select Change Master Password from the submenu. You see the Change Master Password dialog box.
<li>Enter your current master password and click OK.</li>
<li>Enter your new master password, and retype it to confirm the spelling.</li>
</ol>
<p>&nbsp;</p>
<a NAME="encrypt_logout"></a>
<h2>Logging Out of Your Personal Security Password</h2>
<h2>Logging Out of Your Master Password</h2>
<p>Normally, you are asked for your Personal Security Password once during each Netscape 6 session in which you access any of your stored sensitive information. However, you can log out of your Personal Security Password so that it must be entered again before any sensitive information can be stored or retreived. This is useful if you are going to leave your computer unattended for a period of time.</p>
<p>Normally, you are asked for your master password once during each browser session in which you access any of your stored sensitive information. However, you can log out of your master password so that it must be entered again before any sensitive information can be stored or retreived. This is useful if you are going to leave your computer unattended for a period of time.</p>
<p>To log out of your Personal Security Password:</p>
<p>To log out of your master password:</p>
<ol>
<li>Open the Tasks menu, choose Privacy and Security, and then choose Password Manager.
@ -414,15 +417,17 @@ A domain cookie is sent back to any site that's in the same domain as the site t
<p>&nbsp;</p>
<a NAME="encrypt_forget"></a>
<h2>What to Do If You Forget Your Personal Security Password</h2>
<h2>What to Do If You Forget Your Master Password</h2>
<p>If you forget your Personal Security Password, you may have to reset it. In this case, you will need to clear all the sensitive information stored by Password Manager and Form Manager, because without your original Personal Security Password you will not be permitted to use the information.
<p>If you forget your master password, you may have to reset it. In this case, you will need to clear all the sensitive information stored by Password Manager and Form Manager, because without your original master password you will not be permitted to use the information.
<p>To reset your master password:
<p>To reset your Personal Security password:
<ol>
<li>Open the Tasks menu, choose Privacy and Security, and then choose Security Manager.
<li>The Personal Security Manager window appears. Click the Help button to read about what to do when you forget your Personal Security Password.
<li>Open the Tasks menu, choose Privacy and Security, and then choose Password Manager.</li>
<li>Select Change Master Password from the submenu. You see the Change Master Password dialog box.
<li>Follow the directions to change your master password.
</ol>
<p>To clear all stored passwords and other sensitive information:
@ -445,10 +450,10 @@ A domain cookie is sent back to any site that's in the same domain as the site t
<hr>
<p><i>10/6/00</i></p>
<p><i>5/9/2001</i></p>
<hr>
<p>Copyright &copy; 1994-2000 Netscape Communications Corporation.</p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body>
</html>