help content updates per b=85925, PDT approved, r=oeschger@netscape.com

This commit is contained in:
cotter%netscape.com 2006-07-27 14:32:53 +00:00
Родитель e6bc0957fb
Коммит 28d23d0022
4 изменённых файлов: 9 добавлений и 9 удалений

Просмотреть файл

@ -35,7 +35,7 @@ requests one, click As Every Time.
<a NAME="Manage_Certificates"></a> <a NAME="Manage_Certificates"></a>
<h3>Manage Certificates</h3> <h3>Manage Certificates</h3>
<p>Certificates are the digital equivalent of ID cards&151;they help other people <p>Certificates are the digital equivalent of ID cards&#151;they help other people
identify you, and they help you identify other people, web sites, and organizations. identify you, and they help you identify other people, web sites, and organizations.
<p>To examine or configure the certificates you have on file, click Manage Certificates. <p>To examine or configure the certificates you have on file, click Manage Certificates.
@ -55,7 +55,7 @@ security device, and you can use additional security devices, such as smart card
</p> </p>
<hr> <hr>
<p><i>6/19/2001</i></p> <p><i>7/3/2001</i></p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p> <p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body> </body>

Просмотреть файл

@ -35,7 +35,7 @@
<a NAME="Encrypting_Versus_Obscuring"></a> <a NAME="Encrypting_Versus_Obscuring"></a>
<h3>Encrypting Versus Obscuring</h3> <h3>Encrypting Versus Obscuring</h3>
<p>If you use Password Manager or Form Manager to save passwords and personal data, then this sensitive information is stored on your computer in a file that's difficult, but not impossible, for an intruder to read. This way of storing information is sometimes describes as &quot;obscuring.&quot; <p>If you use Password Manager or Form Manager to save passwords and personal data, then this sensitive information is stored on your computer in a file that's difficult, but not impossible, for an intruder to read. This way of storing information is sometimes described as &quot;obscuring.&quot;
<p>For improved protection, you may want to protect the file with encryption. Encryption makes it nearly impossible for an unauthorized person to view your stored sensitive information. <p>For improved protection, you may want to protect the file with encryption. Encryption makes it nearly impossible for an unauthorized person to view your stored sensitive information.
@ -145,7 +145,7 @@
<hr> <hr>
<p><i>7/5/2001</i></p> <p><i>7/9/2001</i></p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p> <p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body> </body>

Просмотреть файл

@ -34,7 +34,7 @@ SSL. TLS 1.0 can be thought of as SSL 3.1.
<p><b>Important note re TLS:</b> Some servers that do not implement SSL correctly cannot negotiate the SSL handshake with client software (such as the browser) that supports TLS. Such servers are known as "TLS intolerant." <p><b>Important note re TLS:</b> Some servers that do not implement SSL correctly cannot negotiate the SSL handshake with client software (such as the browser) that supports TLS. Such servers are known as "TLS intolerant."
<p>When the "Enable TLS" option in the SSL preferences panel is selected, the browser attempts to use the TLS protocol when making secure connections with a server. If that connection fails because the server is TLS intolerant, the browser will fall back to using SSL 3.0. <p>When the Enable TLS option in the SSL preferences panel is selected, the browser attempts to use the TLS protocol when making secure connections with a server. If that connection fails because the server is TLS intolerant, the browser will fall back to using SSL 3.0.
<p>There is currently one important exception to this behavior: If you are using a proxy for SSL connections, the browser will not attempt to use TLS at all. Instead, it will attempt to use SSL 3.0. <p>There is currently one important exception to this behavior: If you are using a proxy for SSL connections, the browser will not attempt to use TLS at all. Instead, it will attempt to use SSL 3.0.
@ -71,7 +71,7 @@ information that isn't encrypted. </b>If you send unencrypted information over t
</p> </p>
<hr> <hr>
<p><i>7/2/2001</body> <p><i>7/5/2001</i></body>
</html> </html>

Просмотреть файл

@ -45,9 +45,9 @@
<ul> <ul>
<LI><B>Do not use OCSP for certificate verification.</B> Select this setting if you don't want Certificate Manager to perform an on-line status check each time it verifies a certificate. Instead, whenever Certificate Manager performs <a href="glossary.html#1025527">certificate verification</a>, it only confirms the certificate's validity period and that it is correctly signed by a CA whose own CA certificate is both listed under the CA Certificates tab (in the main Certificate Manager window) and marked as trusted for issuing that kind of certificate.</LI> <LI><B>Do not use OCSP for certificate verification.</B> Select this setting if you don't want Certificate Manager to perform an on-line status check each time it verifies a certificate. Instead, whenever Certificate Manager performs <a href="glossary.html#1025527">certificate verification</a>, it only confirms the certificate's validity period and that it is correctly signed by a CA whose own CA certificate is both listed under the CA Certificates tab (in the main Certificate Manager window) and marked as trusted for issuing that kind of certificate.</LI>
<LI><B>Use OCSP to verify only certificates that specify an OCSP service URL.</B> Select this setting if you want Certificate Manager perform an on-line status check each time it verifies a certificate that specifies a URL for the purpose of performing such a check. If a URL is specified by the certificate, Certificate Manager makes sure that the certificate is listed there as valid as well as performing the standard checks of validity period and trust settings.</LI> <LI><B>Use OCSP to verify only certificates that specify an OCSP service URL.</B> Select this setting if you want Certificate Manager perform an on-line status check each time it verifies a certificate that specifies a URL for the purpose of performing such a check. If a URL is specified by the certificate, Certificate Manager makes sure that the certificate is listed there as valid as well as performing the standard checks of validity period and trust settings.</LI>
<LI><B>Use OCSP to verify all certificates, using the URL and signer specified here.</B> Select this setting if you want Certificate Manager to perform an on-line status check each time it verifies any certificate. If you select this setting, you should also choose the certificate from the Response Signer pop-up menu that identifies the signer of the OCSP responses. With this setting, the only certificates Certificate Manager recognizes are those that can be verified by an OCSP response signed with the Response Signer certificate (or signed using a certificate that chains to it).<br><br> <LI><B>Use OCSP to verify all certificates, using the URL and signer specified here.</B> Select this setting if you want Certificate Manager to perform an on-line status check each time it verifies any certificate. If you select this setting, you should also choose the certificate from the Response Signer pop-up menu that identifies the signer of the OCSP responses. With this setting, the only certificates Certificate Manager recognizes are those that can be verified by an OCSP response signed with the Response Signer certificate (or signed using a certificate that chains to it).
When you choose a Response Signer certificate from the pop-up menu, Certificate Manager fills in the Service URL (if available) for that signer automatically. If the Service URL is not filled in automatically, you must provide it yourself; ask your system administrator for details.</LI> <p>When you choose a Response Signer certificate from the pop-up menu, Certificate Manager fills in the Service URL (if available) for that signer automatically. If the Service URL is not filled in automatically, you must provide it yourself; ask your system administrator for details.</LI>
</ul> </ul>
@ -57,7 +57,7 @@ When you choose a Response Signer certificate from the pop-up menu, Certificate
</p> </p>
<hr> <hr>
<p><i>6/19/2001</i></p> <p><i>7/5/2001</i></p>
<p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p> <p>Copyright &copy; 1994-2001 Netscape Communications Corporation.</p>
</body> </body>