ongoing help content updates per bugzilla 122806 & ADT, r=oeschger; latest privacy & security legal reviews, formatting updates

This commit is contained in:
cotter%netscape.com 2002-06-14 02:19:38 +00:00
Родитель 4c4d965cce
Коммит 9f37b07140
27 изменённых файлов: 1528 добавлений и 1254 удалений

Просмотреть файл

@ -8,8 +8,9 @@
</head>
<body bgcolor="white">
<a NAME="cert_dialog_help_first"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr><h1>Certificate Information and Decisions</h1>
<p>This section describes how to use various windows displayed at different times by Certificate Manager. The additional information given here appears when you click the Help button in one of those windows. </P>
@ -37,7 +38,7 @@
<hr><h2>Certificate Viewer</h2>
<p>The Certificate Viewer displays information about a certificate you selected in one of the Certificate Manager tabs. For most people, the General tab provides sufficient information. The Details tab provides complete details on the certificate's contents&mdash;information normally of interest to IS professionals only.</p>
<p>The Certificate Viewer displays information about a certificate you selected in one of the Certificate Manager tabs. The General tab summarizes information about who issued the certificate, its verification status, what the certificate can be used for, and so on. The Details tab provides complete details on the certificate's contents.</p>
<p>If you are not currently viewing the Certificate Viewer, follow these steps:
@ -290,8 +291,8 @@
<p>You can take these actions from the Expired Server Certificate dialog box:
<ul><li><b>View Certificate:</b> To examine information about the certificate, including its validity period, click View Certificate.</P>
<li><b>OK:</b> If you believe the certificate's expiration is an inadvertent error, click OK to accept the certificate anyway for this session, and let the webmaster for the site know about the problem.
<p>If you suspect that there is a more significant problem, be cautious about any actions you take while you are visiting the site.
<li><b>OK:</b> If you have reason to believe the certificate's expiration is an inadvertent error, you may choose to click OK to accept the certificate anyway for this session, and let the webmaster for the site know about the problem.
<p>Be cautious about any actions you take while you are visiting the site.
<li><b>Cancel:</b> If you suspect that there may be a significant problem and you don't want to risk visiting the site at all, click Cancel (in which case Certificate Manager will not connect you to the site).
</ul>
@ -311,8 +312,8 @@
<p>You can take these actions from the Server Certificate Not Yet Valid dialog box:
<ul><li><b>View Certificate:</b> To examine information about the certificate, including its validity period, click View Certificate.</P>
<li><b>OK:</b> If you believe the problem is an inadvertent error, click OK to accept the certificate anyway for this session, and let the webmaster for the site know about the problem.
<p>If you suspect that there is a more significant problem, be cautious about any actions you take while you are visiting the site.
<li><b>OK:</b> If you have rason to believe the problem is an inadvertent error, you may choose to click OK to accept the certificate anyway for this session, and let the webmaster for the site know about the problem.
<p>Be cautious about any actions you take while you are visiting the site.
<li><b>Cancel:</b> If you suspect that there may be a significant problem and you don't want to risk visiting the site at all, click Cancel (in which case Certificate Manager will not connect you to the site).
</ul>
@ -328,8 +329,8 @@
<p>You can take these actions from the Domain Name Mismatch dialog box:
<ul><li><b>View Certificate:</b> To examine information about the certificate, click View Certificate.</P>
<li><b>OK:</b> If you believe the problem is an inadvertent error, click OK to accept the certificate anyway for this session, and let the webmaster for the site know about the problem.
<p>If you suspect that there is a more significant problem, be cautious about any actions you take while you are visiting the site, and treat any information you find there as potentially suspect.
<li><b>OK:</b> If you have reason to believe the problem is an inadvertent error, you may choose to click OK to accept the certificate anyway for this session, and let the webmaster for the site know about the problem.
<p>Be cautious about any actions you take while you are visiting the site, and treat any information you find there as potentially suspect.
<li><b>Cancel:</b> If you suspect that there may be a significant problem and you don't want to risk visiting the site at all, click Cancel (in which case Certificate Manager will not connect you to the site).
</ul>
@ -340,7 +341,7 @@
<hr>
<p><i>5 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -7,11 +7,12 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<a NAME="certs_first"></a><hr>
<h1>Certificate Manager</h1>
<p>This section describes how to use the Certificate Manager. For more general information on using certificates, see <a href="using_certs_help.html">Using Certificates</a>.
<p>This section describes how to use the Certificate Manager. For more information on using certificates, see <a href="using_certs_help.html">Using Certificates</a>.
<p>If you are not currently viewing the Certificate Manager window, follow these steps:
@ -89,7 +90,9 @@
<p>If someone obtains the file containing a certificate that you have backed up and successfully imports the certificate, that person can send messages or access web sites while pretending to be you. This can be a problem, for example, if you digitally sign important email messages or manage your bank or investment accounts over the Internet.
<p>Therefore, it's important to select a certificate backup password that is difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. <p>For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>Therefore, it's important to select a certificate backup password that is difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. It does not guarantee that your password cannot be guessed, however.
<p>For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>It's also important to record the password in a safe place—and not anywhere that's easily accessible to someone else. If you forget this password, you can't import the backup of your certificate.</p>
@ -291,7 +294,7 @@ Here you specify whether you want to trust the selected certificate for identify
</ul>
<hr>
<p><i>9 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -7,11 +7,12 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<a NAME="certs_first"></a><hr>
<h1>Certificate Manager</h1>
<p>This section describes how to use the Certificate Manager. For more general information on using certificates, see <a href="using_certs_help.html">Using Certificates</a>.
<p>This section describes how to use the Certificate Manager. For more information on using certificates, see <a href="using_certs_help.html">Using Certificates</a>.
<p>If you are not currently viewing the Certificate Manager window, follow these steps:
@ -89,7 +90,9 @@
<p>If someone obtains the file containing a certificate that you have backed up and successfully imports the certificate, that person can send messages or access web sites while pretending to be you. This can be a problem, for example, if you digitally sign important email messages or manage your bank or investment accounts over the Internet.
<p>Therefore, it's important to select a certificate backup password that is difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. <p>For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>Therefore, it's important to select a certificate backup password that is difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. It does not guarantee that your password cannot be guessed, however.
<p>For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>It's also important to record the password in a safe place—and not anywhere that's easily accessible to someone else. If you forget this password, you can't import the backup of your certificate.</p>
@ -291,7 +294,7 @@ Here you specify whether you want to trust the selected certificate for identify
</ul>
<hr>
<p><i>9 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,12 +8,15 @@
</head>
<body bgcolor="white">
<a NAME="using_certs_settings"></a>
<a NAME="certificates:settingsIDX"></a>
<a NAME="settings:certificateIDX"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr><h1>Certificate Settings</h1>
<hr>
<h1>Certificate Settings</h1>
<p>This section describes how to set your certificate preferences and how to use the Certificate Manager, Device Manager, and other dialog boxes related to certificates.
@ -51,7 +54,7 @@
<p>Some web sites require you to identify yourself with a certificate. The option you select here determines how Navigator identifies the certificate to present among those you may have on file:
<ul>
<LI><b>Select Automatically:</b> Click this option if you want Navigator to select a certificate without asking you. This is usually the preferred setting.
<LI><b>Select Automatically:</b> Click this option if you want Navigator to select a certificate without asking you. This is the default setting.
<LI><b>Ask Every Time:</b> Click this option if you want Navigator to ask you which certificate to use each time a web site requests one.
</ul>
@ -75,7 +78,7 @@ security device, and you can use additional security devices, such as smart card
<hr>
<p><i>3 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,12 +8,15 @@
</head>
<body bgcolor="white">
<a NAME="using_certs_settings"></a>
<a NAME="certificates:settingsIDX"></a>
<a NAME="settings:certificateIDX"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr><h1>Certificate Settings</h1>
<hr>
<h1>Certificate Settings</h1>
<p>This section describes how to set your certificate preferences and how to use the Certificate Manager, Device Manager, and other dialog boxes related to certificates.
@ -51,7 +54,7 @@
<p>Some web sites require you to identify yourself with a certificate. The option you select here determines how Navigator identifies the certificate to present among those you may have on file:
<ul>
<LI><b>Select Automatically:</b> Click this option if you want Navigator to select a certificate without asking you. This is usually the preferred setting.
<LI><b>Select Automatically:</b> Click this option if you want Navigator to select a certificate without asking you. This is the default setting.
<LI><b>Ask Every Time:</b> Click this option if you want Navigator to ask you which certificate to use each time a web site requests one.
</ul>
@ -75,7 +78,7 @@ security device, and you can use additional security devices, such as smart card
<hr>
<p><i>3 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -1,212 +1,216 @@
/* Cascading Style Sheet for Mozilla On-Screen Help */
H1, H2, H3, H4, H5, H6, P, UL, OL, DIR, MENU, DIV,
DT, DD, ADDRESS, BLOCKQUOTE, PRE, BR, HR { display: block }
B, STRONG, I, EM, CITE, VAR, TT, CODE, KBD, SAMP,
IMG, SPAN { display: inline }
LI { font-family: arial, helvetica, sans-serif; font-size: 12px; margin-top: 0; margin-bottom: 5 }
H1, H2, H3, H4 { margin-top: 0; margin-bottom: 0 }
H5, H6 { margin-top: 0 }
H1 { text-align: left }
H3, H5 { font-style: normal }
H1 { font-family: arial, helvetica, sans-serif; font-size: 18px }
H2 { font-family: arial, helvetica, sans-serif; font-size: 16px }
H3 { font-family: arial, helvetica, sans-serif; font-size: 14px }
H4 { font-family: arial, helvetica, sans-serif; font-size: 12px }
H5 { font-family: arial, helvetica, sans-serif; font-size: 12px }
H6 { font-family: arial, helvetica, sans-serif; font-size: 12px }
P { font-family: arial, helvetica, sans-serif; font-size: 12px; }
B, STRONG { font-weight: bold } /* relative to the parent */
I, CITE, EM, VAR, ADDRESS { font-style: italic }
PRE, TT, CODE, KBD, SAMP { font-family: monospace }
PRE { white-space: pre }
PRE { font-size: 12px }
ADDRESS { margin-left: 0 }
ADDRESS { font-size: 12px }
BLOCKQUOTE { margin-left: 0; margin-right: 0 }
BLOCKQUOTE { font-family: arial, helvetica, sans-serif; font-size: 12px; }
UL, DIR { list-style: disc }
UL { margin-left: -1em }
UL { font-family: arial, helvetica, sans-serif; font-size: 12px; margin-top: 0; margin-bottom: 5 }
OL { list-style: decimal }
OL { margin-left: -1em }
OL { font-family: arial, helvetica, sans-serif; font-size: 12px; margin-top: 0; margin-bottom: 5 }
MENU { margin: 0 } /* tight formatting */
LI { margin-left: 0 }
LI { font-size: 12px; margin-top: 0 }
DT { margin-bottom: 0 }
DT { font-family: arial, helvetica, sans-serif; font-size: 12px }
DD { margin-top: 0 }
DD { margin-left: 1em }
DD { font-family: arial, helvetica, sans-serif; font-size: 12px }
TD { font-family: arial, helvetica, sans-serif;}
TD { font-size: 12px }
TH { font-family: arial, helvetica, sans-serif;}
TH { font-size: 12px }
TR { font-family: arial, helvetica, sans-serif;}
TR { font-size: 12px }
HR { border-top: solid } /* 'border-bottom' could also have been used */
.keyword {
font-family: helvetica, arial;
font-size: 12px;
text-decoration: none;
margin-top: 0;
margin-bottom: 0;
}
.lookfor {
font-family: helvetica, arial;
font-size: 12px;
text-decoration: none;
margin-top: -6;
margin-bottom: 0;
}
.label {
font-family: helvetica, arial;
font-size: 12px;
color: #000066;
}
.container {
font-family: helvetica, arial;
font-size: 10px;
margin-top: 12;
margin-bottom: 4;
color: 000000;
font-weight:bold;
}
.unselectedItem {
font-family: helvetica, arial;
font-size: 12px;
margin-left: 4;
margin-top: 8;
margin-bottom: 4;
color: 6600ff;
}
.selectedItem {
font-family: helvetica, arial;
font-size: 12px;
margin-left: 4;
margin-top: 8;
margin-bottom: 4;
color: 6600ff;
font-weight: bold;
}
.tocintrotext {
font-family: helvetica, arial;
font-size: 12px;
margin-top: 0;
margin-bottom: 4;
color: 000000;
}
.inthissection {
font-family: arial, helvetica, sans-serif;
font-size: 12px;
line-height: .7;
}
.inthissections {
font-family: arial, helvetica, sans-serif;
font-size: 12px;
line-height: 1;
margin-top: 0;
margin-bottom: 4;
}
.banner {
font-family: arial, helvetica, sans-serif;
font-size: 24px
}
/* Cascading Style Sheet for Mozilla On-Screen Help */
H1, H2, H3, H4, H5, H6, P, UL, OL, DIR, MENU, DIV,
DT, DD, ADDRESS, BLOCKQUOTE, PRE, BR, HR { display: block }
B, STRONG, I, EM, CITE, VAR, TT, CODE, KBD, SAMP,
IMG, SPAN { display: inline }
LI { font-family: arial, helvetica, sans-serif; font-size: 12px; margin-top: 0; margin-bottom: 5 }
H1, H2, H3, H4 { margin-top: 0; margin-bottom: 0 }
H5, H6 { margin-top: 0 }
H1 { text-align: left }
H3, H5 { font-style: normal }
H1 { font-family: arial, helvetica, sans-serif; font-size: 18px }
H2 { font-family: arial, helvetica, sans-serif; font-size: 16px }
H3 { font-family: arial, helvetica, sans-serif; font-size: 14px }
H4 { font-family: arial, helvetica, sans-serif; font-size: 12px }
H5 { font-family: arial, helvetica, sans-serif; font-size: 12px }
H6 { font-family: arial, helvetica, sans-serif; font-size: 12px }
P { font-family: arial, helvetica, sans-serif; font-size: 12px; }
B, STRONG { font-weight: bold } /* relative to the parent */
I, CITE, EM, VAR, ADDRESS { font-style: italic }
PRE, TT, CODE, KBD, SAMP { font-family: monospace }
PRE { white-space: pre }
PRE { font-size: 12px }
ADDRESS { margin-left: 0 }
ADDRESS { font-size: 12px }
BLOCKQUOTE { margin-left: 0; margin-right: 0 }
BLOCKQUOTE { font-family: arial, helvetica, sans-serif; font-size: 12px; }
UL, DIR { list-style: disc }
UL { margin-left: -1em }
UL { font-family: arial, helvetica, sans-serif; font-size: 12px; margin-top: 0; margin-bottom: 5 }
OL { list-style: decimal }
OL { margin-left: -1em }
OL { font-family: arial, helvetica, sans-serif; font-size: 12px; margin-top: 0; margin-bottom: 5 }
MENU { margin: 0 } /* tight formatting */
LI { margin-left: 0 }
LI { font-size: 12px; margin-top: 0 }
DT { margin-bottom: 0 }
DT { font-family: arial, helvetica, sans-serif; font-size: 12px }
DD { margin-top: 0 }
DD { margin-left: 1em }
DD { font-family: arial, helvetica, sans-serif; font-size: 12px }
TD { font-family: arial, helvetica, sans-serif;}
TD { font-size: 12px }
TH { font-family: arial, helvetica, sans-serif;}
TH { font-size: 12px }
TR { font-family: arial, helvetica, sans-serif;}
TR { font-size: 12px }
HR { border-top: solid } /* 'border-bottom' could also have been used */
.keyword {
font-family: helvetica, arial;
font-size: 12px;
text-decoration: none;
margin-top: 0;
margin-bottom: 0;
}
.lookfor {
font-family: helvetica, arial;
font-size: 12px;
text-decoration: none;
margin-top: -6;
margin-bottom: 0;
}
.label {
font-family: helvetica, arial;
font-size: 12px;
color: #000066;
}
.container {
font-family: helvetica, arial;
font-size: 10px;
margin-top: 12;
margin-bottom: 4;
color: 000000;
font-weight:bold;
}
.unselectedItem {
font-family: helvetica, arial;
font-size: 12px;
margin-left: 4;
margin-top: 8;
margin-bottom: 4;
color: 6600ff;
}
.selectedItem {
font-family: helvetica, arial;
font-size: 12px;
margin-left: 4;
margin-top: 8;
margin-bottom: 4;
color: 6600ff;
font-weight: bold;
}
.tocintrotext {
font-family: helvetica, arial;
font-size: 12px;
margin-top: 0;
margin-bottom: 4;
color: 000000;
}
.inthissection {
font-family: arial, helvetica, sans-serif;
font-size: 12px;
line-height: .7;
}
.inthissections {
font-family: arial, helvetica, sans-serif;
font-size: 12px;
line-height: 1;
margin-top: 0;
margin-bottom: 4;
}
.banner {
font-family: arial, helvetica, sans-serif;
font-size: 24px
}
.boilerplate {
font-family: arial, helvetica, sans-serif;
font-size: 10px;
}

Просмотреть файл

@ -5,8 +5,9 @@
</HEAD>
<body>
<div class="boilerplate">This glossary is provided for your information only, and is not meant to be relied upon as a complete or authoritative description of the terms defined below or of the privacy and/or security ramifications of the technologies described.</div>
<h1><A NAME="glossary"></A><A NAME="996904">
<hr><h1><A NAME="glossary"></A><A NAME="996904">
Glossary
</A></h1><p>
<A NAME="authentication"></A><A NAME="998782">
@ -30,8 +31,7 @@ A certificate that identifies a certificate authority. See also <a href="glossar
</A>
<p><a name="cache"></a>
<b>cache.</b>&nbsp;A collection of web page copies stored on your computer's hard disk. The browser accumulates these copies as you browse the Web. When you click a link or type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> to fetch a particular web page for which the cache already contains a copy, the browser compares the cached copy to the original. If there have been no changes, the browser uses the cached copy rather than refetching the original, saving processing and download time. <p>
<b>cache.</b>&nbsp;A collection of web page copies stored on your computer's hard disk or in its random-access memory (RAM). The browser accumulates these copies as you browse the Web. When you click a link or type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> to fetch a particular web page for which the cache already contains a copy, the browser compares the cached copy to the original. If there have been no changes, the browser uses the cached copy rather than refetching the original, saving processing and download time. <p>
<A NAME="certificate"></A><A NAME="1018895">
@ -66,8 +66,7 @@ A hierarchical series of certificates signed by successive certificate authoriti
<A NAME="certificate_fingerprint"></A><A NAME="1020297">
<B>certificate fingerprint.</B>&nbsp;
</A><A NAME="1020326">
A unique number associated with a certificate. The number is not part of the certificate itself but is produced by applying a mathematical function to the contents of the certificate. If the contents of the certificate change, even by a single character, the function produces a different number. Certificate fingerprints can therefore be used to verify that certificates have not been tampered with.<P>
</A>A unique number associated with a certificate. The number is not part of the certificate itself but is produced by applying a mathematical function to the contents of the certificate. If the contents of the certificate change, even by a single character, the function produces a different number. Certificate fingerprints can therefore be used to verify that certificates have not been tampered with.<P>
</A>
<A NAME="Certificate_Manager"></A>
@ -124,6 +123,9 @@ A certificate that a <a href="glossary.html#1029510">client</a> (such as browser
<p><a name="cookie"></a>
<b>cookie.</b>&nbsp;A small bit of information stored on your computer by some web sites. When you visit such a site, the site asks your browser to place one or more cookies on your hard disk. Later, when you return to the site, your browser sends the site the cookies that belong to it. Cookies help web sites keep track of information about you, such as the contents of your shopping cart. You can set your cookie preferences to control how cookies are used and how much information you are willing to let web sites store on them. See also <a href="#foreign_cookie">foreign_cookie</a>.<p>
<p><a name="Cookie_Manager"></a>
<b>Cookie Manager.</b>&nbsp;The part of the browser that you can use to control <a href="#cookie">cookies</a>. For details, see <a href="using_priv_help.html">Using the Cookie Manager</a>. <p>
<A NAME="cryptographic_algorithm"></A><A NAME="1019976">
<B>cryptographic algorithm.</B>&nbsp;
@ -207,7 +209,11 @@ Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US
</A>
<p><a name="foreign_cookie"></a>
<b>foreign cookie.</b>&nbsp;A cookie from one site that gets stored on your computer when you visit a different site. For example you might visit <tt>www.example.com</tt>, which displays an image from a different site called <tt>www.example.net</tt>. So when you visit <tt>www.example.com</tt> your browser makes a side-trip to <tt>www.example.net</tt> to get the image, and <tt>www.example.net</tt> stores the cookie at that time. <p>
<b>foreign cookie.</b>&nbsp;A cookie from one site that gets stored on your computer when you visit a different site. Sometimes a web site displays content that is hosted on another web site. That content can be anything from an image to text or an advertisement. The second web site that hosts such elements also has the ability to store a cookie in your browser, even though you don't visit it directly. Also known as &quot;third-party cookie.&quot; <p>
<p><a name="Form_Manager"></a>
<b>Form Manager.</b>&nbsp;The part of the browser that can help you save the personal data you enter into online forms, such as your name, address, phone, and so on. Then, when a web site presents you with a form, Form Manager can fill it in automatically. For details, see <a href="using_priv_help.html#using_forms">Using the Form Manager</a>. <p>
<p><a name="helper_application"></a>
<b>helper application.</b>&nbsp;Any application that is used to open or view a file downloaded by the browser. A <a href="#plug-in">plug-in</a> is a special kind of helper application that installs itself into the Plugins directory of the main browser installation directory and can typically be opened within the browser itself (internally). Microsoft Word, Adobe Photoshop, and other external applications are considered helper applications but not plug-ins, since they don't install themselves into the browser directory, but can be opened from the download dialog box.
@ -218,7 +224,7 @@ Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US
<p><a name="Hypertext_Markup_Language_(HTML)"></a>
<b>Hypertext Markup Language (HTML).</b>&nbsp; The document format used for Web pages. The HTML standard defines tags, or codes, used to define the text layout, fonts, style, images, and other elements that make up a web page. <p>
<p><a name="implicit_consent"></a><b>implicit consent.</b>&nbsp; Used to describe privacy settings that may allow web sites to gather information about you (for example by means of <a href="#cookie">cookies</a> and online forms) unless you explicitly choose to withhold your consent by selecting an option on a page that the web site provides for that purpose. Your consent may not be requested when the information is actually gathered.<p>
<p><a name="implicit_consent"></a><b>implicit consent.</b>&nbsp; Also known as implied or &quot;opt-out&quot; consent. Used to describe privacy settings that may allow web sites to gather information about you (for example by means of <a href="#cookie">cookies</a> and online forms) unless you explicitly choose to withhold your consent by selecting an option on a page that the web site provides for that purpose. Your consent may not be requested when the information is actually gathered.<p>
<p><a NAME="IMAP_glossary"></a>
<b>Internet Message Access Protocol (IMAP).</b>&nbsp;A standard mail server protocol that allows you to store all your messages and any changes to them on the server rather than on your computer's hard disk. Using IMAP rather than <a href="#POP_glossary">POP</a> saves disk space and allows you to access your entire mailbox, including sent mail, drafts, and custom folders, from any location. Using an IMAP server over a modem is generally faster than using a POP mail server, since you initially download message headers only. Not all ISPs support IMAP. <p>
@ -251,8 +257,8 @@ A standard protocol for accessing directory services, such as corporate address
<P>
</A>
<A NAME="location_bar"></A>
<B>location bar.</B>&nbsp; The field (and associated buttons) near the top of a Navigator window where you can type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> or search terms. For details, see <a href="nav_help.html#nav_move">Moving to Another Page</a>.<P>
<A NAME="Location_Bar"></A>
<B>Location Bar.</B>&nbsp; The field (and associated buttons) near the top of a Navigator window where you can type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> or search terms. For details, see <a href="nav_help.html#nav_move">Moving to Another Page</a>.<P>
<A NAME="master_key"></A><A NAME="1032598">
<B>master key.</B>&nbsp;
@ -273,6 +279,23 @@ A password used by Certificate Manager to protect the master key and/or private
Presentation of an entity as a person or organization that it is not. For example, a web site might pretend to be a furniture store when it is really just a site that takes credit card payments but never sends any goods. See also <a href="glossary.html#1014366">spoofing</a>.<P>
</A>
<A NAME="navigation_toolbar"></A>
<B>Navigation Toolbar.</B>&nbsp; The toolbar near the top of the browser window that includes the Back and Forward buttons.<P>
<p><a name="Netscape_CalendarIDX"></a>
<p><a name="calendarIDX"></a>
<p><a name="scheduling_meetingsSDX"></a>
<p><a name="scheduling_appointmentsSDX"></a>
<p><a name="Netscape_Calendar"></a>
<b>Netscape Calendar.</b>&nbsp;An application for tracking your schedule and related tasks. If you are using Netscape at work, this application may be available from the Window menu within Netscape. If you are using Netscape at home, or if your workplace doesn't have Netscape Calendar available, you can use the web-based calendar available at www.netscape.com. <tt><a href="http://www.netscape.com" target="_blank">www.netscape.com</a></tt>.<p>
<A NAME="talkbackSDX"></A>
<A NAME="talkbackIDX"></A>
<A NAME="netscape_talkback"></A>
<B>Netscape Quality Feedback Agent.</B>&nbsp; A small piece of software embedded in Netscape 7.0 that gathers technical information when the program quits unexpectedly. After asking your permission, the agent sends this information to Netscape. If you choose to participate, you can add comments about what was happening when the crash occurred. Netscape uses the feedback to fix bugs and improve performance. The agent and related services are sometimes called &quot;talkbalk.&quot; For more information, see the online document <a href="http://help.netscape.com/netscape7/qfs3.html" target="_blank">Netscape Quality Feedback System for Netscape</a>.<P>
<A NAME="nonrepudiation"></A><A NAME="999248">
<B>nonrepudiation.</B>&nbsp;
</A><A NAME="999254">
@ -303,8 +326,11 @@ A set of rules that Certificate Manager follows to perform an online check of a
Confident identification by means of a name and password. See also <a href="glossary.html#998782">authentication</a>.<P>
</A>
<p><a name="Password_Manager"></a>
<b>Password Manager.</b>&nbsp;The part of the browser that can help you remember some or all of your names and passwords by storing them on your computer's hard disk, and entering them for you automatically when you visit such sites. For details, see <a href="using_priv_help.html#using_password">Using the Password Manager</a>. <p>
<A NAME="personal_toolbar"></A>
<B>personal toolbar.</B>&nbsp; The cutomizable toolbar that appears just below the location bar by default in Navigator . It contains standard buttons such as Home, Search, Bookmarks, and so on that you can add or remove. You can also add buttons for your favorite bookmarks, or folders containing groups of bookmarks. For details, see <a href="customize_help.html#cust_personal">Personal Toolbar</a>.<P>
<B>Personal Toolbar.</B>&nbsp; The cutomizable toolbar that appears just below the location bar by default in Navigator . It contains standard buttons such as Home, Search, Bookmarks, and so on that you can add or remove. You can also add buttons for your favorite bookmarks, or folders containing groups of bookmarks. For details, see <a href="customize_help.html#cust_personal">Personal Toolbar</a>.<P>
<A NAME="PKCS_#11"></A><A NAME="1025194">
@ -479,6 +505,11 @@ A <a href="glossary.html#1020903">certificate authority (CA)</a> whose certifica
An encryption method that uses a single cryptographic key to both encrypt and decrypt a given message.<P>
</A>
<A NAME="talkback"></A>
<B>talkback.</B>&nbsp; See <a href="#netscape_talkback">Netscape Quality Feedback Agent</a>.<P>
<A NAME="tamper_detection"></A><A NAME="999618">
<B>tamper detection.</B>&nbsp;
</A><A NAME="999631">
@ -490,6 +521,9 @@ A mechanism ensuring that data received in electronic form has not been tampered
See <a href="#Transmission_Control_Protocol_Internet_Protocol_(TCP_IP)">Transmission Control Protocol/Internet Protocol (TCP/IP)</a>.<P>
</A>
<p><a name="third-party_cookie"></a>
<b>third-party cookie.</b>&nbsp;See <a href="#foreign_cookie">foreign cookie</a>.<p>
<A NAME="TLS"></A><A NAME="1027427">
<B>TLS.</B>&nbsp;
</A><A NAME="1027428">
@ -517,7 +551,7 @@ Confident reliance on a person or other entity. In the context of <a href="gloss
<p><a name="Uniform_Resource_Locator_(URL)"></a>
<b>Uniform Resource Locator (URL).</b>&nbsp;The standardized address that tells your browser how to locate a file or other resource on the Web. For example: <tt>http://www.netscape.com.</tt> You can type URLs into the browser's location bar to access web pages. URLs are also used in the links on web pages that you can click to go to other web pages. Also known as an Internet address or Web address.<p>
<b>Uniform Resource Locator (URL).</b>&nbsp;The standardized address that tells your browser how to locate a file or other resource on the Web. For example: <tt>http://www.netscape.com.</tt> You can type URLs into the browser's Location Bar to access web pages. URLs are also used in the links on web pages that you can click to go to other web pages. Also known as an Internet address or Web address.<p>
<p><a name="web_page"></a>
<b>web page.</b>&nbsp;A single document on the World Wide Web that is specified by a unique address or URL and that may contain text, hyperlinks, and graphics.<p>
@ -536,7 +570,7 @@ Confident reliance on a person or other entity. In the context of <a href="gloss
</p>
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation</p>
<BR>

Просмотреть файл

@ -5,8 +5,9 @@
</HEAD>
<body>
<div class="boilerplate">This glossary is provided for your information only, and is not meant to be relied upon as a complete or authoritative description of the terms defined below or of the privacy and/or security ramifications of the technologies described.</div>
<h1><A NAME="glossary"></A><A NAME="996904">
<hr><h1><A NAME="glossary"></A><A NAME="996904">
Glossary
</A></h1><p>
<A NAME="authentication"></A><A NAME="998782">
@ -30,8 +31,7 @@ A certificate that identifies a certificate authority. See also <a href="glossar
</A>
<p><a name="cache"></a>
<b>cache.</b>&nbsp;A collection of web page copies stored on your computer's hard disk. The browser accumulates these copies as you browse the Web. When you click a link or type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> to fetch a particular web page for which the cache already contains a copy, the browser compares the cached copy to the original. If there have been no changes, the browser uses the cached copy rather than refetching the original, saving processing and download time. <p>
<b>cache.</b>&nbsp;A collection of web page copies stored on your computer's hard disk or in its random-access memory (RAM). The browser accumulates these copies as you browse the Web. When you click a link or type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> to fetch a particular web page for which the cache already contains a copy, the browser compares the cached copy to the original. If there have been no changes, the browser uses the cached copy rather than refetching the original, saving processing and download time. <p>
<A NAME="certificate"></A><A NAME="1018895">
@ -66,8 +66,7 @@ A hierarchical series of certificates signed by successive certificate authoriti
<A NAME="certificate_fingerprint"></A><A NAME="1020297">
<B>certificate fingerprint.</B>&nbsp;
</A><A NAME="1020326">
A unique number associated with a certificate. The number is not part of the certificate itself but is produced by applying a mathematical function to the contents of the certificate. If the contents of the certificate change, even by a single character, the function produces a different number. Certificate fingerprints can therefore be used to verify that certificates have not been tampered with.<P>
</A>A unique number associated with a certificate. The number is not part of the certificate itself but is produced by applying a mathematical function to the contents of the certificate. If the contents of the certificate change, even by a single character, the function produces a different number. Certificate fingerprints can therefore be used to verify that certificates have not been tampered with.<P>
</A>
<A NAME="Certificate_Manager"></A>
@ -124,6 +123,9 @@ A certificate that a <a href="glossary.html#1029510">client</a> (such as browser
<p><a name="cookie"></a>
<b>cookie.</b>&nbsp;A small bit of information stored on your computer by some web sites. When you visit such a site, the site asks your browser to place one or more cookies on your hard disk. Later, when you return to the site, your browser sends the site the cookies that belong to it. Cookies help web sites keep track of information about you, such as the contents of your shopping cart. You can set your cookie preferences to control how cookies are used and how much information you are willing to let web sites store on them. See also <a href="#foreign_cookie">foreign_cookie</a>.<p>
<p><a name="Cookie_Manager"></a>
<b>Cookie Manager.</b>&nbsp;The part of the browser that you can use to control <a href="#cookie">cookies</a>. For details, see <a href="using_priv_help.html">Using the Cookie Manager</a>. <p>
<A NAME="cryptographic_algorithm"></A><A NAME="1019976">
<B>cryptographic algorithm.</B>&nbsp;
@ -207,7 +209,11 @@ Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US
</A>
<p><a name="foreign_cookie"></a>
<b>foreign cookie.</b>&nbsp;A cookie from one site that gets stored on your computer when you visit a different site. For example you might visit <tt>www.example.com</tt>, which displays an image from a different site called <tt>www.example.net</tt>. So when you visit <tt>www.example.com</tt> your browser makes a side-trip to <tt>www.example.net</tt> to get the image, and <tt>www.example.net</tt> stores the cookie at that time. <p>
<b>foreign cookie.</b>&nbsp;A cookie from one site that gets stored on your computer when you visit a different site. Sometimes a web site displays content that is hosted on another web site. That content can be anything from an image to text or an advertisement. The second web site that hosts such elements also has the ability to store a cookie in your browser, even though you don't visit it directly. Also known as &quot;third-party cookie.&quot; <p>
<p><a name="Form_Manager"></a>
<b>Form Manager.</b>&nbsp;The part of the browser that can help you save the personal data you enter into online forms, such as your name, address, phone, and so on. Then, when a web site presents you with a form, Form Manager can fill it in automatically. For details, see <a href="using_priv_help.html#using_forms">Using the Form Manager</a>. <p>
<p><a name="helper_application"></a>
<b>helper application.</b>&nbsp;Any application that is used to open or view a file downloaded by the browser. A <a href="#plug-in">plug-in</a> is a special kind of helper application that installs itself into the Plugins directory of the main browser installation directory and can typically be opened within the browser itself (internally). Microsoft Word, Adobe Photoshop, and other external applications are considered helper applications but not plug-ins, since they don't install themselves into the browser directory, but can be opened from the download dialog box.
@ -218,7 +224,7 @@ Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US
<p><a name="Hypertext_Markup_Language_(HTML)"></a>
<b>Hypertext Markup Language (HTML).</b>&nbsp; The document format used for Web pages. The HTML standard defines tags, or codes, used to define the text layout, fonts, style, images, and other elements that make up a web page. <p>
<p><a name="implicit_consent"></a><b>implicit consent.</b>&nbsp; Used to describe privacy settings that may allow web sites to gather information about you (for example by means of <a href="#cookie">cookies</a> and online forms) unless you explicitly choose to withhold your consent by selecting an option on a page that the web site provides for that purpose. Your consent may not be requested when the information is actually gathered.<p>
<p><a name="implicit_consent"></a><b>implicit consent.</b>&nbsp; Also known as implied or &quot;opt-out&quot; consent. Used to describe privacy settings that may allow web sites to gather information about you (for example by means of <a href="#cookie">cookies</a> and online forms) unless you explicitly choose to withhold your consent by selecting an option on a page that the web site provides for that purpose. Your consent may not be requested when the information is actually gathered.<p>
<p><a NAME="IMAP_glossary"></a>
<b>Internet Message Access Protocol (IMAP).</b>&nbsp;A standard mail server protocol that allows you to store all your messages and any changes to them on the server rather than on your computer's hard disk. Using IMAP rather than <a href="#POP_glossary">POP</a> saves disk space and allows you to access your entire mailbox, including sent mail, drafts, and custom folders, from any location. Using an IMAP server over a modem is generally faster than using a POP mail server, since you initially download message headers only. Not all ISPs support IMAP. <p>
@ -251,8 +257,8 @@ A standard protocol for accessing directory services, such as corporate address
<P>
</A>
<A NAME="location_bar"></A>
<B>location bar.</B>&nbsp; The field (and associated buttons) near the top of a Navigator window where you can type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> or search terms. For details, see <a href="nav_help.html#nav_move">Moving to Another Page</a>.<P>
<A NAME="Location_Bar"></A>
<B>Location Bar.</B>&nbsp; The field (and associated buttons) near the top of a Navigator window where you can type a <a href="#Uniform_Resource_Locator_(URL)">URL</a> or search terms. For details, see <a href="nav_help.html#nav_move">Moving to Another Page</a>.<P>
<A NAME="master_key"></A><A NAME="1032598">
<B>master key.</B>&nbsp;
@ -273,6 +279,23 @@ A password used by Certificate Manager to protect the master key and/or private
Presentation of an entity as a person or organization that it is not. For example, a web site might pretend to be a furniture store when it is really just a site that takes credit card payments but never sends any goods. See also <a href="glossary.html#1014366">spoofing</a>.<P>
</A>
<A NAME="navigation_toolbar"></A>
<B>Navigation Toolbar.</B>&nbsp; The toolbar near the top of the browser window that includes the Back and Forward buttons.<P>
<p><a name="Netscape_CalendarIDX"></a>
<p><a name="calendarIDX"></a>
<p><a name="scheduling_meetingsSDX"></a>
<p><a name="scheduling_appointmentsSDX"></a>
<p><a name="Netscape_Calendar"></a>
<b>Netscape Calendar.</b>&nbsp;An application for tracking your schedule and related tasks. If you are using Netscape at work, this application may be available from the Window menu within Netscape. If you are using Netscape at home, or if your workplace doesn't have Netscape Calendar available, you can use the web-based calendar available at www.netscape.com. <tt><a href="http://www.netscape.com" target="_blank">www.netscape.com</a></tt>.<p>
<A NAME="talkbackSDX"></A>
<A NAME="talkbackIDX"></A>
<A NAME="netscape_talkback"></A>
<B>Netscape Quality Feedback Agent.</B>&nbsp; A small piece of software embedded in Netscape 7.0 that gathers technical information when the program quits unexpectedly. After asking your permission, the agent sends this information to Netscape. If you choose to participate, you can add comments about what was happening when the crash occurred. Netscape uses the feedback to fix bugs and improve performance. The agent and related services are sometimes called &quot;talkbalk.&quot; For more information, see the online document <a href="http://help.netscape.com/netscape7/qfs3.html" target="_blank">Netscape Quality Feedback System for Netscape</a>.<P>
<A NAME="nonrepudiation"></A><A NAME="999248">
<B>nonrepudiation.</B>&nbsp;
</A><A NAME="999254">
@ -303,8 +326,11 @@ A set of rules that Certificate Manager follows to perform an online check of a
Confident identification by means of a name and password. See also <a href="glossary.html#998782">authentication</a>.<P>
</A>
<p><a name="Password_Manager"></a>
<b>Password Manager.</b>&nbsp;The part of the browser that can help you remember some or all of your names and passwords by storing them on your computer's hard disk, and entering them for you automatically when you visit such sites. For details, see <a href="using_priv_help.html#using_password">Using the Password Manager</a>. <p>
<A NAME="personal_toolbar"></A>
<B>personal toolbar.</B>&nbsp; The cutomizable toolbar that appears just below the location bar by default in Navigator . It contains standard buttons such as Home, Search, Bookmarks, and so on that you can add or remove. You can also add buttons for your favorite bookmarks, or folders containing groups of bookmarks. For details, see <a href="customize_help.html#cust_personal">Personal Toolbar</a>.<P>
<B>Personal Toolbar.</B>&nbsp; The cutomizable toolbar that appears just below the location bar by default in Navigator . It contains standard buttons such as Home, Search, Bookmarks, and so on that you can add or remove. You can also add buttons for your favorite bookmarks, or folders containing groups of bookmarks. For details, see <a href="customize_help.html#cust_personal">Personal Toolbar</a>.<P>
<A NAME="PKCS_#11"></A><A NAME="1025194">
@ -479,6 +505,11 @@ A <a href="glossary.html#1020903">certificate authority (CA)</a> whose certifica
An encryption method that uses a single cryptographic key to both encrypt and decrypt a given message.<P>
</A>
<A NAME="talkback"></A>
<B>talkback.</B>&nbsp; See <a href="#netscape_talkback">Netscape Quality Feedback Agent</a>.<P>
<A NAME="tamper_detection"></A><A NAME="999618">
<B>tamper detection.</B>&nbsp;
</A><A NAME="999631">
@ -490,6 +521,9 @@ A mechanism ensuring that data received in electronic form has not been tampered
See <a href="#Transmission_Control_Protocol_Internet_Protocol_(TCP_IP)">Transmission Control Protocol/Internet Protocol (TCP/IP)</a>.<P>
</A>
<p><a name="third-party_cookie"></a>
<b>third-party cookie.</b>&nbsp;See <a href="#foreign_cookie">foreign cookie</a>.<p>
<A NAME="TLS"></A><A NAME="1027427">
<B>TLS.</B>&nbsp;
</A><A NAME="1027428">
@ -517,7 +551,7 @@ Confident reliance on a person or other entity. In the context of <a href="gloss
<p><a name="Uniform_Resource_Locator_(URL)"></a>
<b>Uniform Resource Locator (URL).</b>&nbsp;The standardized address that tells your browser how to locate a file or other resource on the Web. For example: <tt>http://www.netscape.com.</tt> You can type URLs into the browser's location bar to access web pages. URLs are also used in the links on web pages that you can click to go to other web pages. Also known as an Internet address or Web address.<p>
<b>Uniform Resource Locator (URL).</b>&nbsp;The standardized address that tells your browser how to locate a file or other resource on the Web. For example: <tt>http://www.netscape.com.</tt> You can type URLs into the browser's Location Bar to access web pages. URLs are also used in the links on web pages that you can click to go to other web pages. Also known as an Internet address or Web address.<p>
<p><a name="web_page"></a>
<b>web page.</b>&nbsp;A single document on the World Wide Web that is specified by a unique address or URL and that may contain text, hyperlinks, and graphics.<p>
@ -536,7 +570,7 @@ Confident reliance on a person or other entity. In the context of <a href="gloss
</p>
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation</p>
<BR>

Просмотреть файл

@ -27,6 +27,7 @@
<rdf:li> <rdf:Description nc:name="client authentication" nc:link="glossary.html#1021054"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="client SSL certificate" nc:link="glossary.html#1014561"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="cookie" nc:link="glossary.html#cookie"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Cookie Manager" nc:link="glossary.html#Cookie_Manager"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="cryptographic algorithm" nc:link="glossary.html#1019976"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="cryptography" nc:link="glossary.html#1026002"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="decryption" nc:link="glossary.html#998999"/> </rdf:li>
@ -42,6 +43,7 @@
<rdf:li> <rdf:Description nc:name="fingerprint" nc:link="glossary.html#1020434"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="FIPS PUBS 140-1" nc:link="glossary.html#1025742"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="foreign cookie" nc:link="glossary.html#foreign_cookie"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Form Manager" nc:link="glossary.html#Form_Manager"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="helper application" nc:link="glossary.html#helper_application"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="home page" nc:link="glossary.html#home_page"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Hypertext Markup Language (HTML)" nc:link="glossary.html#Hypertext_Markup_Language_(HTML)"/> </rdf:li>
@ -53,15 +55,19 @@
<rdf:li> <rdf:Description nc:name="JavaScript" nc:link="glossary.html#JavaScript"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="key" nc:link="glossary.html#999203"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Lightweight Directory Access Protocol (LDAP)" nc:link="glossary.html#1022286"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="location bar" nc:link="glossary.html#location_bar"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Location Bar" nc:link="glossary.html#location_bar"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="master key" nc:link="glossary.html#1032598"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="master password" nc:link="glossary.html#1032744"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="misrepresentation" nc:link="glossary.html#1014057"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="navigation toolbar" nc:link="glossary.html#navigation_toolbar"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Netscape Calendar" nc:link="glossary.html#Netscape_Calendar"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Netscape Quality Feedback Agent" nc:link="glossary.html#netscape_talkback"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="nonrepudiation" nc:link="glossary.html#999248"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="object signing" nc:link="glossary.html#1014095"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="object-signing certificate" nc:link="glossary.html#1014097"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Online Certificate Status Protocol (OCSP)" nc:link="glossary.html#1029304"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="password-based authentication" nc:link="glossary.html#1014123"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Password Manager" nc:link="glossary.html#Password_Manager"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="personal toolbar" nc:link="glossary.html#personal_toolbar"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="PKCS #11" nc:link="glossary.html#1025194"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="PKCS #11 module" nc:link="glossary.html#1025197"/> </rdf:li>
@ -95,6 +101,7 @@
<rdf:li> <rdf:Description nc:name="subordinate CA" nc:link="glossary.html#999541"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="symmetric encryption" nc:link="glossary.html#999604"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="tamper detection" nc:link="glossary.html#999618"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="third-party cookie" nc:link="glossary.html#third-party_cookie"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="TLS" nc:link="glossary.html#1027427"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="token" nc:link="glossary.html#1024528"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="TCP/IP (Transmission Control Protocol/Internet Protocol)" nc:link="glossary.html#tcp"/> </rdf:li>

Просмотреть файл

@ -16,8 +16,10 @@
<a NAME="Mail_and_Newsgroups:encrypting_messagesIDX"></a>
<a NAME="signing_email_messagesIDX"></a>
<a NAME="encryption:of_email_messagesIDX"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr><h1>Signing &amp; Encrypting Messages</h1>
<hr>
<h1>Signing &amp; Encrypting Messages</h1>
<p>&nbsp;
@ -45,16 +47,16 @@
<p>When you compose a mail message, you can choose to attach your digital signature to it. A <a href="glossary.html#digital_signature">digital signature</a> allows recipients of the message to verify that the message really comes from you and hasn't been tampered with since you sent it.
<p>When you compose a mail message, you can also choose to encrypt it. <a href="glossary.html#encryption">Encryption</a> makes it nearly impossible for anyone other than the intended recipient to read the message while it is in transit over the Internet.
<p>When you compose a mail message, you can also choose to encrypt it. <a href="glossary.html#encryption">Encryption</a> makes it very difficult for anyone other than the intended recipient to read the message while it is in transit over the Internet.
<p>Signing and encryption are not available for newsgroup messages.
<p>Before you can sign or encrypt a message, you must take these preliminary steps:
<ol>
<li>Obtain one or more <a href="glossary.html#certificate">certificates</a> (the digital eqivalents of ID cards). For details, see <a href="using_certs_help.html#using_certs_get">Getting Your Own Certificate</a>.
<li>Obtain one or more <a href="glossary.html#certificate">certificates</a> (the digital eqivalents of ID cards). For details, see <a href="using_certs_help.html#using_certs_get">Getting Your Own Certificate</a>.</li>
<li>Configure the security settings for your email account. For details, see <a href="#config_account">Configuring Your Security Settings</a>.
<li>Configure the security settings for your email account. For details, see <a href="#config_account">Configuring Your Security Settings</a>.</li>
</ol>
@ -62,6 +64,7 @@
<p>The sections that follow provide a brief overview of how digital signatures and encryption work. For more technical details on this subject, see the online document <a href="http://developer.netscape.com/docs/manuals/security/pkin/index.htm" TARGET="_blank">Introduction to Public-Key Cryptography</a>.
<p>&nbsp;</p>
<a NAME="how_sigs_work"></a>
<h3>How Digital Signatures Work</h3>
@ -73,11 +76,11 @@
<p>To create a digital signature for an email message that you are sending, you need two things:
<ul>
<li>A <a href="glossary.html#signing_certificate">signing certificate</a> that identifies you for this purpose. Every time you sign a message, your signing certificate is included with the message. The certificate includes a <a href="glossary.html#public_key">public key</a>. The presence of the certificate in the message permits the recipient to verify your digital signature.
<li>A <a href="glossary.html#signing_certificate">signing certificate</a> that identifies you for this purpose. Every time you sign a message, your signing certificate is included with the message. The certificate includes a <a href="glossary.html#public_key">public key</a>. The presence of the certificate in the message permits the recipient to verify your digital signature.</li>
<p>Your certificate is a bit like your name and phone number in the phonebook&mdash;it is public information that helps other people communicate with you.
<li>A <a href="glossary.html#private_key">private key</a>, which is created and stored on your computer when you first obtain a certificate.
<li>A <a href="glossary.html#private_key">private key</a>, which is created and stored on your computer when you first obtain a certificate. </li>
<p>Your private key is protected by your <a href="glossary.html#master_password">master password</a> and is not normally disclosed to anyone else. The Mail &amp; Newsgroup software uses your private key to create a unique, verifiable digital signature for every message you choose to sign.
<p>Your private key for a signing certificate is protected by your <a href="glossary.html#master_password">master password,</a> and the Netscape program does not disclose it to anyone else. The Mail &amp; Newsgroup software uses your private key to create a unique, verifiable digital signature for every message you choose to sign.
</ul>
@ -92,6 +95,10 @@ How Encryption Works</h3>
<p>The recipient's software uses the recipient's private key, which remains on that person's computer, to decrypt the message.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="get_mail_certs"></a>
<a name="LDAP:fetching_certificatesIDX></a>
@ -104,12 +111,15 @@ How Encryption Works</h3>
<p>Another way to obtain certificates is to look them up in a public directory, such as the &quot;phonebook&quot; directories maintained by many companies.
<p>It's also possible to look up certificates automatically. This feature is controlled by <a href="mail_help.html#PREFERENCES_MAILNEWS_ADDRESSING">Mail & Newsgroups Preferences - Addressing</a> or <a href="mail_help.html#addressing_settings">Mail & Newgroups Account Settings - Addressing</a>, which can be configured to look up recipients&apos; email addresses in a directory.
<p>It's also possible to look up certificates automatically. This feature is controlled by <a href="mail_help.html#PREFERENCES_MAILNEWS_ADDRESSING">Mail &amp; Newsgroups Preferences - Addressing</a> or <a href="mail_help.html#addressing_settings">Mail &amp; Newgroups Account Settings - Addressing</a>, which can be configured to look up recipients&apos; email addresses in a directory.
<p>When you are using any account that is configured to look up addresses in a directory, the same directory will be searched for matching certificates when you attempt to send an encrypted message to one or more recipients for whom you don't have certificates on file.
<p>The directory will also be searched for missing certificates when you open the drop-down menu below the Security icon in the Compose window and choose View Security Info.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
@ -125,11 +135,11 @@ How Encryption Works</h3>
<p>To specify which signing and encryption certificates to use with a particular account, begin from the Mail window:
<ol>
<li>Open the Edit menu and choose Mail &amp; Newsgroups Account Settings.
<li>Click Security under the name of the mail account whose security settings you want to configure.
<li>Open the Edit menu and choose Mail &amp; Newsgroups Account Settings.</li>
<li>Click Security under the name of the mail account whose security settings you want to configure.</li>
<li>Under Digital Signing, click Select. (You may be asked to provide your <a href="glossary.html#master_password">Master Password</a> before you can proceed further.)</li>
<p>A dialog box appears that allows you to select from among your available signing certificates.
<li>Choose the signing certificate you want to use, then click OK.
<li>Choose the signing certificate you want to use, then click OK.</li>
<li>Follow the same steps under Encryption: click the Select button, select the encryption certificate you want to use, and click OK.</li>
<p>In some cases you may be able to specify the same certificate under Encryption that you specified under Digital Signing; check with your system administrator to find out for sure.
@ -143,14 +153,18 @@ How Encryption Works</h3>
<ul>
<li>Under Digital Signing:</li>
<ul><li><b>Digitally sign messages:</b> When this checkbox is selected, all the messages you send from this account will be digitally signed unless you indicate otherwise before you send the message. To turn off this default setting, deselect the checkbox. </ul>
<ul><li><b>Digitally sign messages:</b> When this checkbox is selected, all the messages you send from this account will be digitally signed unless you indicate otherwise before you send the message. To turn off this default setting, deselect the checkbox. </li></ul>
<li>Under Encryption (choose one):</li>
<ul><li><b>Never:</b> When this option is selected, messages you send from this account will be not be encrypted unless you indicate otherwise before you send them.
<li><b>Required:</b> When this option is selected, all the messages you send from this account will be encrypted&mdash;but only if you have valid certificates for each of the message's recipients. If you don't have all the necessary certificates, the message can't be sent unless you turn off encryption for that message.
<ul><li><b>Never:</b> When this option is selected, messages you send from this account will be not be encrypted unless you indicate otherwise before you send them.</li>
<li><b>Required:</b> When this option is selected, all the messages you send from this account will be encrypted&mdash;but only if you have valid certificates for each of the message's recipients. If you don't have all the necessary certificates, the message can't be sent unless you turn off encryption for that message. </li>
</ul></ul>
<p>When you have finished configuring your mail security settings, click OK to confirm them.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="signing"></a>
@ -162,18 +176,21 @@ How Encryption Works</h3>
<p>To open a Compose window, start from the Mail window and click Compose. You can immediately identify the default security settings from the presence or absence of these icons near the lower-right corner of the window:</p>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message will be digitally signed (assuming you have a valid email certificate that identifies you).</td>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message will be encrypted (assuming you have valid certificates for all recipients).</td></table>
</ul>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message will be digitally signed (assuming you have a valid email certificate that identifies you).</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message will be encrypted (assuming you have valid certificates for all recipients).</td></tr></table>
<p>To turn these settings off or on, click the arrow just below the Security icon in the Mail toolbar near the top of the window. Then select the item you want from the drop-down list:
<ul>
<li><b>Do Not Encrypt This Message:</b> Choose this to turn off encryption for this message. The message will not be encrypted when it is sent over the Internet.
<li><b>Encrypt This Message:</b> Choose this to turn on encryption for this message. The message will be sent in encrypted form. However, it can't be sent unless you have valid certificates for all recipients.
<li><b>Digitally Sign This Message:</b> Choose this to turn digital signing on or off for this message. A checkmark indicates the message will be signed.
<li><b>View Security Info:</b> Choose this to view detailed information about the security status of this message&mdash;to help you determine, for example, whether you need to obtain a certificate for one of the recipients.
<li><b>Do Not Encrypt This Message:</b> Choose this to turn off encryption for this message. The message will not be encrypted when it is sent over the Internet.</li>
<li><b>Encrypt This Message:</b> Choose this to turn on encryption for this message. The message will be sent in encrypted form. However, it can't be sent unless you have valid certificates for all recipients.</li>
<li><b>Digitally Sign This Message:</b> Choose this to turn digital signing on or off for this message. A checkmark indicates the message will be signed.</li>
<li><b>View Security Info:</b> Choose this to view detailed information about the security status of this message&mdash;to help you determine, for example, whether you need to obtain a certificate for one of the recipients.</li>
</ul>
<p>To view detailed information about the message's security status, you can also click the key or lock icon as described in <a href="#compose_security">Message Security - Compose Window</a>.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a name="security:checking_for_received_messagesIDX"></a>
@ -184,9 +201,9 @@ How Encryption Works</h3>
<p>When you view a signed or encrypted message in the Mail window, these icons near the upper-right corner of the message header indicate the security status of the message:</p>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message is digitally signed and has been validated. If there is a problem with the signature, the pen is broken.</td>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignUnknown.gif" alt="unknown icon"></td><td>The message is signed, but it has a large attachment that has not yet been downloaded from the IMAP server. As a result, the signature cannot be validated. Click the icon to download the attachment and validate the signature.</td>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message is encrypted. If there is a problem with the encryption, the key is broken.</td>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message is digitally signed and has been validated. If there is a problem with the signature, the pen is broken.</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignUnknown.gif" alt="unknown icon"></td><td>The message is signed, but it has a large attachment that has not yet been downloaded from the IMAP server. As a result, the signature cannot be validated. Click the icon to download the attachment and validate the signature.</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message is encrypted. If there is a problem with the encryption, the key is broken.</td></tr>
</table>
<p>For information about certificate validation, see <a href="using_certs_help.html#Controlling_Validation">Controlling Validation</a>.
@ -194,13 +211,18 @@ How Encryption Works</h3>
<p>To see more detailed information about the message's security, click the key or lock icon, or follow the instructions in <a href="#received_security">Message Security - Received Message</a>.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<hr>
<a NAME="encryption:status_of_message_before sendingIDX"></a>
<a name="security:checking_before_sending_messageIDX"></a>
<a name="checking_security_before_sending_messageSDX"></a>
<a NAME="compose_security"></a><hr>
<a NAME="compose_security"></a>
<h2>Message Security - Compose Window</h2>
<p>This section describes the Message Security window that you can open for any message you are composing. If you're not already viewing Message Security, click the Security icon in the toolbar of the Compose window.
@ -212,18 +234,18 @@ How Encryption Works</h3>
<li><b>Digitally Signed:</b> This line describes whether your message will be signed. There are three possibilities:</li>
<ul>
<li><b>Yes:</b> Digital signing has been enabled for this message, you have a valid certificate identifying you, and the message can be be signed.
<li><b>No:</b> Digital signing has been disabled for this message.
<li><b>Not possible:</b> Digital signing has been enabled for this message. However, a valid <a href="glossary.html#certificate">certificate</a> identifying you for this purpose is not available, or there is some other problem that makes signing impossible.
<li><b>Yes:</b> Digital signing has been enabled for this message, you have a valid certificate identifying you, and the message can be be signed.</li>
<li><b>No:</b> Digital signing has been disabled for this message.</li>
<li><b>Not possible:</b> Digital signing has been enabled for this message. However, a valid <a href="glossary.html#certificate">certificate</a> identifying you for this purpose is not available, or there is some other problem that makes signing impossible.</li>
</ul>
<li><b>Encrypted:</b> This line describes whether your message will be encrypted. There are three possibilities:</li>
<ul>
<li><b>Yes:</b> Encryption has been enabled for this message, valid certificates for all listed recipients are available, and the message can be encryted.
<li><b>No:</b> Encryption has been disabled or is not possible for this message.
<li><b>Not possible:</b> Encryption has been enabled for this message. However, a valid certificate for at least one of the listed recipients is not available, or no recipients are listed, or there is some other problem that makes encryption impossible.
<li><b>Yes:</b> Encryption has been enabled for this message, valid certificates for all listed recipients are available, and the message can be encryted.</li>
<li><b>No:</b> Encryption has been disabled or is not possible for this message.</li>
<li><b>Not possible:</b> Encryption has been enabled for this message. However, a valid certificate for at least one of the listed recipients is not available, or no recipients are listed, or there is some other problem that makes encryption impossible.</li>
</ul>
</ul>
@ -231,7 +253,7 @@ How Encryption Works</h3>
<p>The Message Security window also lists the certificates available for the recipients of your message:
<ul>
<li><b>View.</b> To view the details for any certificate in the list, select its name, then click View.
<li><b>View.</b> To view the details for any certificate in the list, select its name, then click View.</li>
</ul>
<p>For more information about obtaining certificates and configuring message security settings, see <a href="#secure_mail_first">Signing &amp; Encrypting Messages</a>
@ -240,40 +262,48 @@ How Encryption Works</h3>
<p>To indicate your default signing and encryption preferences for all messages, see <a href="mail_help.html#security_settings">Mail &amp; Newsgroups Account Settings - Security</a>
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="encryption:status_of_received messageIDX"></a>
<hr><a NAME="encryption:status_of_received messageIDX"></a>
<a NAME="received_security"></a>
<hr><h2>Message Security - Received Message</h2>
<h2>Message Security - Received Message</h2>
<p>This section describes the Message Security window that you can open for any message you have received. If you're not already viewing Message Security for a received message, follow these steps:
<ol>
<li>In the Mail window, select the message for which you want to view security information.
<li>Open the View menu and choose Message Security Info.
<li>In the Mail window, select the message for which you want to view security information.</li>
<li>Open the View menu and choose Message Security Info.</li>
</ol>
<p>The Message Security window displays the following information:
<ul>
<li><b>Digital Signature.</b> The top section describes whether the message is digitally signed and if so, whether the signature is valid.
<li><b>Digital Signature.</b> The top section describes whether the message is digitally signed and if so, whether the signature is valid. </li>
<p>If validation failed while OCSP was enabled, check the OCSP settings in <a href="validation_help.html#validation_first">Privacy &amp; Security Preferences - Validation</a>. If you are not familiar with OCSP, confirm the settings with your system administrator. If your settings are correct, there may be a problem with the OCSP service or the certificate used to create the signature is no longer valid. </li>
<p>If the signature is invalid because of a problem with a certificate's trust settings, you can use the <a href="certs_help.html">Certificate Manager</a> to view or edit those settings.
<li><b>View Signature Certificate.</b> If the message is signed, click this button to view the certificate that was used to sign it.
<li><b>View Signature Certificate.</b> If the message is signed, click this button to view the certificate that was used to sign it. </li>
<li><b>Encryption.</b> The bottom section reports whether the message is encrypted and any decrypting problems.</li>
<ul>
<li>If the message's contents have been altered during transit, you should ask the sender to resend it. The changes may have been caused by network problems.
<li>If the message's contents have been altered during transit, you should ask the sender to resend it. The changes may have been caused by network problems.</li>
<li>If a copy of your own certificate (used by the sender to encrypt the message) is not available on your computer, the private key required to decrypt the message cannot be retrieved. The only solution is to import a backup copy of your certificate and its private key (see <a href="certs_help.html#My_Certificates">Your Certificates</a> for details.) If you don't have access to a backup certificate, you will not be able to decrypt the message.
<li>If a copy of your own certificate (used by the sender to encrypt the message) is not available on your computer, the private key required to decrypt the message cannot be retrieved. The only solution is to import a backup copy of your certificate and its private key (see <a href="certs_help.html#My_Certificates">Your Certificates</a> for details.) If you don't have access to a backup certificate, you will not be able to decrypt the message. </li>
</ul>
</ul>
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;
@ -281,7 +311,7 @@ How Encryption Works</h3>
<hr>
<p><i>9 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -16,8 +16,10 @@
<a NAME="Mail_and_Newsgroups:encrypting_messagesIDX"></a>
<a NAME="signing_email_messagesIDX"></a>
<a NAME="encryption:of_email_messagesIDX"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr><h1>Signing &amp; Encrypting Messages</h1>
<hr>
<h1>Signing &amp; Encrypting Messages</h1>
<p>&nbsp;
@ -45,16 +47,16 @@
<p>When you compose a mail message, you can choose to attach your digital signature to it. A <a href="glossary.html#digital_signature">digital signature</a> allows recipients of the message to verify that the message really comes from you and hasn't been tampered with since you sent it.
<p>When you compose a mail message, you can also choose to encrypt it. <a href="glossary.html#encryption">Encryption</a> makes it nearly impossible for anyone other than the intended recipient to read the message while it is in transit over the Internet.
<p>When you compose a mail message, you can also choose to encrypt it. <a href="glossary.html#encryption">Encryption</a> makes it very difficult for anyone other than the intended recipient to read the message while it is in transit over the Internet.
<p>Signing and encryption are not available for newsgroup messages.
<p>Before you can sign or encrypt a message, you must take these preliminary steps:
<ol>
<li>Obtain one or more <a href="glossary.html#certificate">certificates</a> (the digital eqivalents of ID cards). For details, see <a href="using_certs_help.html#using_certs_get">Getting Your Own Certificate</a>.
<li>Obtain one or more <a href="glossary.html#certificate">certificates</a> (the digital eqivalents of ID cards). For details, see <a href="using_certs_help.html#using_certs_get">Getting Your Own Certificate</a>.</li>
<li>Configure the security settings for your email account. For details, see <a href="#config_account">Configuring Your Security Settings</a>.
<li>Configure the security settings for your email account. For details, see <a href="#config_account">Configuring Your Security Settings</a>.</li>
</ol>
@ -62,6 +64,7 @@
<p>The sections that follow provide a brief overview of how digital signatures and encryption work. For more technical details on this subject, see the online document <a href="http://developer.netscape.com/docs/manuals/security/pkin/index.htm" TARGET="_blank">Introduction to Public-Key Cryptography</a>.
<p>&nbsp;</p>
<a NAME="how_sigs_work"></a>
<h3>How Digital Signatures Work</h3>
@ -73,11 +76,11 @@
<p>To create a digital signature for an email message that you are sending, you need two things:
<ul>
<li>A <a href="glossary.html#signing_certificate">signing certificate</a> that identifies you for this purpose. Every time you sign a message, your signing certificate is included with the message. The certificate includes a <a href="glossary.html#public_key">public key</a>. The presence of the certificate in the message permits the recipient to verify your digital signature.
<li>A <a href="glossary.html#signing_certificate">signing certificate</a> that identifies you for this purpose. Every time you sign a message, your signing certificate is included with the message. The certificate includes a <a href="glossary.html#public_key">public key</a>. The presence of the certificate in the message permits the recipient to verify your digital signature.</li>
<p>Your certificate is a bit like your name and phone number in the phonebook&mdash;it is public information that helps other people communicate with you.
<li>A <a href="glossary.html#private_key">private key</a>, which is created and stored on your computer when you first obtain a certificate.
<li>A <a href="glossary.html#private_key">private key</a>, which is created and stored on your computer when you first obtain a certificate. </li>
<p>Your private key is protected by your <a href="glossary.html#master_password">master password</a> and is not normally disclosed to anyone else. The Mail &amp; Newsgroup software uses your private key to create a unique, verifiable digital signature for every message you choose to sign.
<p>Your private key for a signing certificate is protected by your <a href="glossary.html#master_password">master password,</a> and the Netscape program does not disclose it to anyone else. The Mail &amp; Newsgroup software uses your private key to create a unique, verifiable digital signature for every message you choose to sign.
</ul>
@ -92,6 +95,10 @@ How Encryption Works</h3>
<p>The recipient's software uses the recipient's private key, which remains on that person's computer, to decrypt the message.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="get_mail_certs"></a>
<a name="LDAP:fetching_certificatesIDX></a>
@ -104,12 +111,15 @@ How Encryption Works</h3>
<p>Another way to obtain certificates is to look them up in a public directory, such as the &quot;phonebook&quot; directories maintained by many companies.
<p>It's also possible to look up certificates automatically. This feature is controlled by <a href="mail_help.html#PREFERENCES_MAILNEWS_ADDRESSING">Mail & Newsgroups Preferences - Addressing</a> or <a href="mail_help.html#addressing_settings">Mail & Newgroups Account Settings - Addressing</a>, which can be configured to look up recipients&apos; email addresses in a directory.
<p>It's also possible to look up certificates automatically. This feature is controlled by <a href="mail_help.html#PREFERENCES_MAILNEWS_ADDRESSING">Mail &amp; Newsgroups Preferences - Addressing</a> or <a href="mail_help.html#addressing_settings">Mail &amp; Newgroups Account Settings - Addressing</a>, which can be configured to look up recipients&apos; email addresses in a directory.
<p>When you are using any account that is configured to look up addresses in a directory, the same directory will be searched for matching certificates when you attempt to send an encrypted message to one or more recipients for whom you don't have certificates on file.
<p>The directory will also be searched for missing certificates when you open the drop-down menu below the Security icon in the Compose window and choose View Security Info.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
@ -125,11 +135,11 @@ How Encryption Works</h3>
<p>To specify which signing and encryption certificates to use with a particular account, begin from the Mail window:
<ol>
<li>Open the Edit menu and choose Mail &amp; Newsgroups Account Settings.
<li>Click Security under the name of the mail account whose security settings you want to configure.
<li>Open the Edit menu and choose Mail &amp; Newsgroups Account Settings.</li>
<li>Click Security under the name of the mail account whose security settings you want to configure.</li>
<li>Under Digital Signing, click Select. (You may be asked to provide your <a href="glossary.html#master_password">Master Password</a> before you can proceed further.)</li>
<p>A dialog box appears that allows you to select from among your available signing certificates.
<li>Choose the signing certificate you want to use, then click OK.
<li>Choose the signing certificate you want to use, then click OK.</li>
<li>Follow the same steps under Encryption: click the Select button, select the encryption certificate you want to use, and click OK.</li>
<p>In some cases you may be able to specify the same certificate under Encryption that you specified under Digital Signing; check with your system administrator to find out for sure.
@ -143,14 +153,18 @@ How Encryption Works</h3>
<ul>
<li>Under Digital Signing:</li>
<ul><li><b>Digitally sign messages:</b> When this checkbox is selected, all the messages you send from this account will be digitally signed unless you indicate otherwise before you send the message. To turn off this default setting, deselect the checkbox. </ul>
<ul><li><b>Digitally sign messages:</b> When this checkbox is selected, all the messages you send from this account will be digitally signed unless you indicate otherwise before you send the message. To turn off this default setting, deselect the checkbox. </li></ul>
<li>Under Encryption (choose one):</li>
<ul><li><b>Never:</b> When this option is selected, messages you send from this account will be not be encrypted unless you indicate otherwise before you send them.
<li><b>Required:</b> When this option is selected, all the messages you send from this account will be encrypted&mdash;but only if you have valid certificates for each of the message's recipients. If you don't have all the necessary certificates, the message can't be sent unless you turn off encryption for that message.
<ul><li><b>Never:</b> When this option is selected, messages you send from this account will be not be encrypted unless you indicate otherwise before you send them.</li>
<li><b>Required:</b> When this option is selected, all the messages you send from this account will be encrypted&mdash;but only if you have valid certificates for each of the message's recipients. If you don't have all the necessary certificates, the message can't be sent unless you turn off encryption for that message. </li>
</ul></ul>
<p>When you have finished configuring your mail security settings, click OK to confirm them.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="signing"></a>
@ -162,18 +176,21 @@ How Encryption Works</h3>
<p>To open a Compose window, start from the Mail window and click Compose. You can immediately identify the default security settings from the presence or absence of these icons near the lower-right corner of the window:</p>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message will be digitally signed (assuming you have a valid email certificate that identifies you).</td>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message will be encrypted (assuming you have valid certificates for all recipients).</td></table>
</ul>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message will be digitally signed (assuming you have a valid email certificate that identifies you).</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message will be encrypted (assuming you have valid certificates for all recipients).</td></tr></table>
<p>To turn these settings off or on, click the arrow just below the Security icon in the Mail toolbar near the top of the window. Then select the item you want from the drop-down list:
<ul>
<li><b>Do Not Encrypt This Message:</b> Choose this to turn off encryption for this message. The message will not be encrypted when it is sent over the Internet.
<li><b>Encrypt This Message:</b> Choose this to turn on encryption for this message. The message will be sent in encrypted form. However, it can't be sent unless you have valid certificates for all recipients.
<li><b>Digitally Sign This Message:</b> Choose this to turn digital signing on or off for this message. A checkmark indicates the message will be signed.
<li><b>View Security Info:</b> Choose this to view detailed information about the security status of this message&mdash;to help you determine, for example, whether you need to obtain a certificate for one of the recipients.
<li><b>Do Not Encrypt This Message:</b> Choose this to turn off encryption for this message. The message will not be encrypted when it is sent over the Internet.</li>
<li><b>Encrypt This Message:</b> Choose this to turn on encryption for this message. The message will be sent in encrypted form. However, it can't be sent unless you have valid certificates for all recipients.</li>
<li><b>Digitally Sign This Message:</b> Choose this to turn digital signing on or off for this message. A checkmark indicates the message will be signed.</li>
<li><b>View Security Info:</b> Choose this to view detailed information about the security status of this message&mdash;to help you determine, for example, whether you need to obtain a certificate for one of the recipients.</li>
</ul>
<p>To view detailed information about the message's security status, you can also click the key or lock icon as described in <a href="#compose_security">Message Security - Compose Window</a>.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a name="security:checking_for_received_messagesIDX"></a>
@ -184,9 +201,9 @@ How Encryption Works</h3>
<p>When you view a signed or encrypted message in the Mail window, these icons near the upper-right corner of the message header indicate the security status of the message:</p>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message is digitally signed and has been validated. If there is a problem with the signature, the pen is broken.</td>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignUnknown.gif" alt="unknown icon"></td><td>The message is signed, but it has a large attachment that has not yet been downloaded from the IMAP server. As a result, the signature cannot be validated. Click the icon to download the attachment and validate the signature.</td>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message is encrypted. If there is a problem with the encryption, the key is broken.</td>
<table><tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignOk.gif" alt="digital signature icon"></td><td>The message is digitally signed and has been validated. If there is a problem with the signature, the pen is broken.</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrSignUnknown.gif" alt="unknown icon"></td><td>The message is signed, but it has a large attachment that has not yet been downloaded from the IMAP server. As a result, the signature cannot be validated. Click the icon to download the attachment and validate the signature.</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://messenger/skin/smime/icons/hdrCryptoOk.gif" alt="encryption icon"></td><td>The message is encrypted. If there is a problem with the encryption, the key is broken.</td></tr>
</table>
<p>For information about certificate validation, see <a href="using_certs_help.html#Controlling_Validation">Controlling Validation</a>.
@ -194,13 +211,18 @@ How Encryption Works</h3>
<p>To see more detailed information about the message's security, click the key or lock icon, or follow the instructions in <a href="#received_security">Message Security - Received Message</a>.
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<hr>
<a NAME="encryption:status_of_message_before sendingIDX"></a>
<a name="security:checking_before_sending_messageIDX"></a>
<a name="checking_security_before_sending_messageSDX"></a>
<a NAME="compose_security"></a><hr>
<a NAME="compose_security"></a>
<h2>Message Security - Compose Window</h2>
<p>This section describes the Message Security window that you can open for any message you are composing. If you're not already viewing Message Security, click the Security icon in the toolbar of the Compose window.
@ -212,18 +234,18 @@ How Encryption Works</h3>
<li><b>Digitally Signed:</b> This line describes whether your message will be signed. There are three possibilities:</li>
<ul>
<li><b>Yes:</b> Digital signing has been enabled for this message, you have a valid certificate identifying you, and the message can be be signed.
<li><b>No:</b> Digital signing has been disabled for this message.
<li><b>Not possible:</b> Digital signing has been enabled for this message. However, a valid <a href="glossary.html#certificate">certificate</a> identifying you for this purpose is not available, or there is some other problem that makes signing impossible.
<li><b>Yes:</b> Digital signing has been enabled for this message, you have a valid certificate identifying you, and the message can be be signed.</li>
<li><b>No:</b> Digital signing has been disabled for this message.</li>
<li><b>Not possible:</b> Digital signing has been enabled for this message. However, a valid <a href="glossary.html#certificate">certificate</a> identifying you for this purpose is not available, or there is some other problem that makes signing impossible.</li>
</ul>
<li><b>Encrypted:</b> This line describes whether your message will be encrypted. There are three possibilities:</li>
<ul>
<li><b>Yes:</b> Encryption has been enabled for this message, valid certificates for all listed recipients are available, and the message can be encryted.
<li><b>No:</b> Encryption has been disabled or is not possible for this message.
<li><b>Not possible:</b> Encryption has been enabled for this message. However, a valid certificate for at least one of the listed recipients is not available, or no recipients are listed, or there is some other problem that makes encryption impossible.
<li><b>Yes:</b> Encryption has been enabled for this message, valid certificates for all listed recipients are available, and the message can be encryted.</li>
<li><b>No:</b> Encryption has been disabled or is not possible for this message.</li>
<li><b>Not possible:</b> Encryption has been enabled for this message. However, a valid certificate for at least one of the listed recipients is not available, or no recipients are listed, or there is some other problem that makes encryption impossible.</li>
</ul>
</ul>
@ -231,7 +253,7 @@ How Encryption Works</h3>
<p>The Message Security window also lists the certificates available for the recipients of your message:
<ul>
<li><b>View.</b> To view the details for any certificate in the list, select its name, then click View.
<li><b>View.</b> To view the details for any certificate in the list, select its name, then click View.</li>
</ul>
<p>For more information about obtaining certificates and configuring message security settings, see <a href="#secure_mail_first">Signing &amp; Encrypting Messages</a>
@ -240,40 +262,48 @@ How Encryption Works</h3>
<p>To indicate your default signing and encryption preferences for all messages, see <a href="mail_help.html#security_settings">Mail &amp; Newsgroups Account Settings - Security</a>
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;</p>
<a NAME="encryption:status_of_received messageIDX"></a>
<hr><a NAME="encryption:status_of_received messageIDX"></a>
<a NAME="received_security"></a>
<hr><h2>Message Security - Received Message</h2>
<h2>Message Security - Received Message</h2>
<p>This section describes the Message Security window that you can open for any message you have received. If you're not already viewing Message Security for a received message, follow these steps:
<ol>
<li>In the Mail window, select the message for which you want to view security information.
<li>Open the View menu and choose Message Security Info.
<li>In the Mail window, select the message for which you want to view security information.</li>
<li>Open the View menu and choose Message Security Info.</li>
</ol>
<p>The Message Security window displays the following information:
<ul>
<li><b>Digital Signature.</b> The top section describes whether the message is digitally signed and if so, whether the signature is valid.
<li><b>Digital Signature.</b> The top section describes whether the message is digitally signed and if so, whether the signature is valid. </li>
<p>If validation failed while OCSP was enabled, check the OCSP settings in <a href="validation_help.html#validation_first">Privacy &amp; Security Preferences - Validation</a>. If you are not familiar with OCSP, confirm the settings with your system administrator. If your settings are correct, there may be a problem with the OCSP service or the certificate used to create the signature is no longer valid. </li>
<p>If the signature is invalid because of a problem with a certificate's trust settings, you can use the <a href="certs_help.html">Certificate Manager</a> to view or edit those settings.
<li><b>View Signature Certificate.</b> If the message is signed, click this button to view the certificate that was used to sign it.
<li><b>View Signature Certificate.</b> If the message is signed, click this button to view the certificate that was used to sign it. </li>
<li><b>Encryption.</b> The bottom section reports whether the message is encrypted and any decrypting problems.</li>
<ul>
<li>If the message's contents have been altered during transit, you should ask the sender to resend it. The changes may have been caused by network problems.
<li>If the message's contents have been altered during transit, you should ask the sender to resend it. The changes may have been caused by network problems.</li>
<li>If a copy of your own certificate (used by the sender to encrypt the message) is not available on your computer, the private key required to decrypt the message cannot be retrieved. The only solution is to import a backup copy of your certificate and its private key (see <a href="certs_help.html#My_Certificates">Your Certificates</a> for details.) If you don't have access to a backup certificate, you will not be able to decrypt the message.
<li>If a copy of your own certificate (used by the sender to encrypt the message) is not available on your computer, the private key required to decrypt the message cannot be retrieved. The only solution is to import a backup copy of your certificate and its private key (see <a href="certs_help.html#My_Certificates">Your Certificates</a> for details.) If you don't have access to a backup certificate, you will not be able to decrypt the message. </li>
</ul>
</ul>
<p>
[&nbsp;<A HREF="#secure_mail_first">Return to beginning of section</A>&nbsp;]
</p>
<p>&nbsp;
@ -281,7 +311,7 @@ How Encryption Works</h3>
<hr>
<p><i>9 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,7 +8,9 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="page_info_first"></a>
<a NAME="page_infoIDX"></a>
<h1>Viewing Page Info</h1>
@ -21,7 +23,7 @@
<p>For detailed information about HTML, including the tags displayed by Page Info, see the <a href="http://www.w3.org/TR/REC-html40/" target="_blank">HTML 4.01 Specification</a>.
<p>The Security tab includes information about the security status of the web page you are viewing.</p>
<p>The Privacy and Security tabs include information about the <a href="glossary.html#p3p">Platform for Privacy Preferences (P3P)</a> policies of the web site whose page you are viewing and the security status of that page.</p>
@ -29,11 +31,11 @@
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#pageinfo_general">General (Page Info Tab)</a></p>
<p><a href="#pageinfo_forms">Forms (Page Info Tab)</a></p>
<p><a href="#pageinfo_links">Links (Page Info Tab)</a></p>
<p><a href="#pageinfo_media">Media (Page Info Tab)</a></p>
<p><a href="#pageinfo_security">Security (Page Info Tab)</a></p></td>
<p><a href="#pageinfo_general">General Tab</a></p>
<p><a href="#pageinfo_forms">Forms Tab</a></p>
<p><a href="#pageinfo_links">Links Tab</a></p>
<p><a href="#pageinfo_media">Media Tab</a></p>
<p><a href="#pageinfo_security">Security Tab</a></p></td>
</tr>
</table>
@ -47,8 +49,8 @@
<p>The top portion displays the the name of the page (if it has one) and the following information:
<ul>
<li><b>URL:</b>&nbsp; The <a href="glossary.html#Universal_Resource_Locator_(URL)">Universal Resource Locator</a> for the page&mdash;that is, the standardized address that appears in the location bar near the top of the browser window.
<li><b>Render mode:</b>&nbsp; Indicates whether the browser is using <i>quirks mode</i> or <i>standards compliance mode</i> to lay out the page. Quirks mode takes account of nonstandard behavior that may be used by some older web pages designed for older versions of web browsers that are not fully standards compliant. Standards compliance mode adheres strictly to standards specifications. Your browser chooses the render mode automatically according to information contained in the web page itself.
<li><b>URL:</b>&nbsp; The <a href="glossary.html#Uniform_Resource_Locator_(URL)">Uniform Resource Locator</a> for the page&mdash;that is, the standardized address that appears in the Location Bar near the top of the browser window.
<li><b>Render mode:</b>&nbsp; Indicates whether the browser is using <b>quirks mode</b> or <b>standards compliance mode</b> to lay out the page. Quirks mode takes account of nonstandard behavior that may be used by some older web pages designed for older versions of web browsers that are not fully standards compliant. Standards compliance mode adheres strictly to standards specifications. Your browser chooses the render mode automatically according to information contained in the web page itself.
<li><b>Source:</b>&nbsp; Indicates whether the source code for this page has been cached.
<li><b>Encoding:</b>&nbsp; The character set encoding used for this HTML document.
<li><b>Size:</b>&nbsp; The size of the file, if available.
@ -76,7 +78,7 @@
<p>When you select a form listed in the top portion of the Forms tab, the bottom portion displays detailed information about the way each of of that form's elements is specified in the HTML source:
<ul>
<li><b>Label:</b>&nbsp;The element's label, if any.
<li><b>Label:</b>&nbsp;The element's label (if it is tagged as such in the HTML).
<li><b>Field Name.</b>&nbsp;The element's name.
<li><b>Type:</b>&nbsp;The element's input type, such as <tt>TEXT</tt> (for submitting text), <tt>RADIO</tt> (for a radio button), or <tt>HIDDEN</tt> (for storing information that is submitted but not displayed on the screen).
<li><b>Current Value:</b>&nbsp;The current value of the element. For example, the current value of a text element is the text it currently contains.
@ -90,18 +92,17 @@
<ul>
<li><b>Name:</b>&nbsp;The text displayed in the browser as a link.
<li><b>Address.</b>&nbsp;The <a href="Universal_Resource_Locator_(URL)">URL</a> for the page to which the link points.
<li><b>Address.</b>&nbsp;The <a href="glossary.html#Uniform_Resource_Locator_(URL)">URL</a> for the page to which the link points.
<li><b>Type:</b>&nbsp; The type of link, such Anchor (for a link to a specific place in an HTML document) or Form Submission.
</ul>
<p>
<p>&nbsp;</p>
<a NAME="pageinfo_media"></a>
<h2>Media (Page Info Tab)</h2>
<p>When you choose Page Info from the View menu and click the Media tab, you see a list of all the images and other media elements displayed by the page.
<p>The top portion lists basic information about each element, including its address (<a href="Universal_Resource_Locator_(URL)">URL</a>) and type.
<p>The top portion lists basic information about each element, including its address (<a href="glossary.html#Uniform_Resource_Locator_(URL)">URL</a>) and type.
<p>When you select a media element listed in the top portion of the Media tab, the bottom portion displays available information about that element, such as description, size, or dimensions.
@ -112,9 +113,8 @@
<li><b>Save As:</b> Select the element you want to save, click Save As, and navigate to the location where you want to save it.
</ul>
<p>&nbsp;</p>
<a NAME="pageinfo_security"></a>
<h2>Security (Page Info Tab)</h2>
@ -145,15 +145,17 @@
<LI><B>Low-grade encryption.</B> Weakest encryption available, using 40-bit keys.</LI>
</ul>
<p>Most web sites support high-grade encryption. If you are viewing an older web site that supports a weaker form of encryption, it is possible that other people can view information sent from your computer to the web site or information sent by the web site to your computer, but it is unlikely that someone is actually doing so. </li>
</ul>
<p>Most web sites support high-grade encryption. If you are viewing an older web site that supports a weaker form of encryption, it is possible that other people can view information sent from your computer to the web site or information sent by the web site to your computer, but it is unlikely that someone is actually doing so. </ul>
<p>Lack of any encryption or lack of strong encryption should be of concern only if you are sending or viewing confidential information, such as your credit card number.
<p>You can quickly check the encryption status of a web page by noting the state of the lock icon at the bottom-right corner of the browser window. For more details, see <a href="using_certs_help.html#using_certs_info">Checking Security for a Web Page</a>.
<p>&nbsp;</p>
<hr>
<p><i>22 May 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation</p>
</body>

Просмотреть файл

@ -8,7 +8,9 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="page_info_first"></a>
<a NAME="page_infoIDX"></a>
<h1>Viewing Page Info</h1>
@ -21,7 +23,7 @@
<p>For detailed information about HTML, including the tags displayed by Page Info, see the <a href="http://www.w3.org/TR/REC-html40/" target="_blank">HTML 4.01 Specification</a>.
<p>The Security tab includes information about the security status of the web page you are viewing.</p>
<p>The Privacy and Security tabs include information about the <a href="glossary.html#p3p">Platform for Privacy Preferences (P3P)</a> policies of the web site whose page you are viewing and the security status of that page.</p>
@ -29,11 +31,11 @@
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#pageinfo_general">General (Page Info Tab)</a></p>
<p><a href="#pageinfo_forms">Forms (Page Info Tab)</a></p>
<p><a href="#pageinfo_links">Links (Page Info Tab)</a></p>
<p><a href="#pageinfo_media">Media (Page Info Tab)</a></p>
<p><a href="#pageinfo_security">Security (Page Info Tab)</a></p></td>
<p><a href="#pageinfo_general">General Tab</a></p>
<p><a href="#pageinfo_forms">Forms Tab</a></p>
<p><a href="#pageinfo_links">Links Tab</a></p>
<p><a href="#pageinfo_media">Media Tab</a></p>
<p><a href="#pageinfo_security">Security Tab</a></p></td>
</tr>
</table>
@ -47,8 +49,8 @@
<p>The top portion displays the the name of the page (if it has one) and the following information:
<ul>
<li><b>URL:</b>&nbsp; The <a href="glossary.html#Universal_Resource_Locator_(URL)">Universal Resource Locator</a> for the page&mdash;that is, the standardized address that appears in the location bar near the top of the browser window.
<li><b>Render mode:</b>&nbsp; Indicates whether the browser is using <i>quirks mode</i> or <i>standards compliance mode</i> to lay out the page. Quirks mode takes account of nonstandard behavior that may be used by some older web pages designed for older versions of web browsers that are not fully standards compliant. Standards compliance mode adheres strictly to standards specifications. Your browser chooses the render mode automatically according to information contained in the web page itself.
<li><b>URL:</b>&nbsp; The <a href="glossary.html#Uniform_Resource_Locator_(URL)">Uniform Resource Locator</a> for the page&mdash;that is, the standardized address that appears in the Location Bar near the top of the browser window.
<li><b>Render mode:</b>&nbsp; Indicates whether the browser is using <b>quirks mode</b> or <b>standards compliance mode</b> to lay out the page. Quirks mode takes account of nonstandard behavior that may be used by some older web pages designed for older versions of web browsers that are not fully standards compliant. Standards compliance mode adheres strictly to standards specifications. Your browser chooses the render mode automatically according to information contained in the web page itself.
<li><b>Source:</b>&nbsp; Indicates whether the source code for this page has been cached.
<li><b>Encoding:</b>&nbsp; The character set encoding used for this HTML document.
<li><b>Size:</b>&nbsp; The size of the file, if available.
@ -76,7 +78,7 @@
<p>When you select a form listed in the top portion of the Forms tab, the bottom portion displays detailed information about the way each of of that form's elements is specified in the HTML source:
<ul>
<li><b>Label:</b>&nbsp;The element's label, if any.
<li><b>Label:</b>&nbsp;The element's label (if it is tagged as such in the HTML).
<li><b>Field Name.</b>&nbsp;The element's name.
<li><b>Type:</b>&nbsp;The element's input type, such as <tt>TEXT</tt> (for submitting text), <tt>RADIO</tt> (for a radio button), or <tt>HIDDEN</tt> (for storing information that is submitted but not displayed on the screen).
<li><b>Current Value:</b>&nbsp;The current value of the element. For example, the current value of a text element is the text it currently contains.
@ -90,18 +92,17 @@
<ul>
<li><b>Name:</b>&nbsp;The text displayed in the browser as a link.
<li><b>Address.</b>&nbsp;The <a href="Universal_Resource_Locator_(URL)">URL</a> for the page to which the link points.
<li><b>Address.</b>&nbsp;The <a href="glossary.html#Uniform_Resource_Locator_(URL)">URL</a> for the page to which the link points.
<li><b>Type:</b>&nbsp; The type of link, such Anchor (for a link to a specific place in an HTML document) or Form Submission.
</ul>
<p>
<p>&nbsp;</p>
<a NAME="pageinfo_media"></a>
<h2>Media (Page Info Tab)</h2>
<p>When you choose Page Info from the View menu and click the Media tab, you see a list of all the images and other media elements displayed by the page.
<p>The top portion lists basic information about each element, including its address (<a href="Universal_Resource_Locator_(URL)">URL</a>) and type.
<p>The top portion lists basic information about each element, including its address (<a href="glossary.html#Uniform_Resource_Locator_(URL)">URL</a>) and type.
<p>When you select a media element listed in the top portion of the Media tab, the bottom portion displays available information about that element, such as description, size, or dimensions.
@ -112,9 +113,8 @@
<li><b>Save As:</b> Select the element you want to save, click Save As, and navigate to the location where you want to save it.
</ul>
<p>&nbsp;</p>
<a NAME="pageinfo_security"></a>
<h2>Security (Page Info Tab)</h2>
@ -145,15 +145,17 @@
<LI><B>Low-grade encryption.</B> Weakest encryption available, using 40-bit keys.</LI>
</ul>
<p>Most web sites support high-grade encryption. If you are viewing an older web site that supports a weaker form of encryption, it is possible that other people can view information sent from your computer to the web site or information sent by the web site to your computer, but it is unlikely that someone is actually doing so. </li>
</ul>
<p>Most web sites support high-grade encryption. If you are viewing an older web site that supports a weaker form of encryption, it is possible that other people can view information sent from your computer to the web site or information sent by the web site to your computer, but it is unlikely that someone is actually doing so. </ul>
<p>Lack of any encryption or lack of strong encryption should be of concern only if you are sending or viewing confidential information, such as your credit card number.
<p>You can quickly check the encryption status of a web page by noting the state of the lock icon at the bottom-right corner of the browser window. For more details, see <a href="using_certs_help.html#using_certs_info">Checking Security for a Web Page</a>.
<p>&nbsp;</p>
<hr>
<p><i>22 May 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation</p>
</body>

Просмотреть файл

@ -11,6 +11,7 @@
<a NAME="passwords:settings_forIDX"></a>
<a NAME="password_settings"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<h1>Password Settings</h1>
@ -64,9 +65,9 @@
<a NAME="Encrypting_Versus_Obscuring"></a>
<h3>Encrypting Versus Obscuring</h3>
<p>If you use Password Manager or Form Manager to save passwords and personal data, this sensitive information is stored on your computer in a file that's difficult, but not impossible, for an intruder to read. This way of storing information is sometimes described as &quot;obscuring.&quot;
<p>If you use Password Manager or Form Manager to save passwords and personal data, this sensitive information is stored on your computer in a file that's difficult, but not impossible, for an intruder to read. This way of storing information is sometimes described as &quot;obscuring.&quot; This is the default setting that applies to information stored by Password Manager or Form Manager.
<p>For improved protection, you may want to protect the file with encryption. Encryption makes it much more difficult for an unauthorized person to view your stored sensitive information.
<p>For improved protection, you may choose to protect the file with encryption. Encryption makes it more difficult (but again, not impossible) for an unauthorized person to view your stored sensitive information.
<ul><li><b>Use encryption when storing sensitive data:</b> Select this checkbox to turn on encryption, or deselect it to turn off encryption.</ul>
@ -80,8 +81,6 @@
<li>If you use obscuring, you may not have to set a master password at all (unless you're using certificates for identification purposes), but it may be easier for a stranger who has access to your computer to steal your passwords.
</ul>
<p>In general, if you are working in an environment where you're confident that strangers cannot walk up to your computer, you probably don't need to use encryption.
<p>For more details, see <a href="using_priv_help.html#using_encrypt">Encrypting Stored Sensitive Information</a>.
<p>&nbsp;</p>
@ -179,7 +178,7 @@
<p>You can control how often the browser requests your master password:
<ul>
<LI><B>The first time it is needed.</B> This setting causes the browser to request your master password only the first time it needs access to the private key database after launching. The browser will not request the master password again until after you exit and relaunch it. This setting provides the lowest level of protection.
<LI><B>The first time it is needed.</B> This setting (selected by default) causes the browser to request your master password only the first time it needs access to the private key database after launching. The browser will not request the master password again until after you exit and relaunch it. This setting provides the lowest level of protection.
<LI><B>Every time it is needed.</B> This setting ensures that the browser will never access your saved personal information without first requesting your master password. This setting provides the highest level of protection.
@ -243,7 +242,9 @@
<p>If someone uses your computer who knows or can guess your master password, that person may be able to access web sites while pretending to be you. This can be dangerous&mdash;for example, if you manage your financial accounts over the Internet.
<p>Therefore, it's important to select a master password that's difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>Therefore, it's important to select a master password that's difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. It does not guarantee, however, that no one will be able to guess your password.
<p>For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>It's also important to record your master password in a safe place&mdash;and<b> not </b>anywhere that's easily accessible to someone else. If you forget this password, you may not be able to access important information, such as web sites that require passwords or certificates stored on your computer. </P>
@ -282,7 +283,7 @@
<hr>
<p><i>30 May 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -11,6 +11,7 @@
<a NAME="passwords:settings_forIDX"></a>
<a NAME="password_settings"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<h1>Password Settings</h1>
@ -64,9 +65,9 @@
<a NAME="Encrypting_Versus_Obscuring"></a>
<h3>Encrypting Versus Obscuring</h3>
<p>If you use Password Manager or Form Manager to save passwords and personal data, this sensitive information is stored on your computer in a file that's difficult, but not impossible, for an intruder to read. This way of storing information is sometimes described as &quot;obscuring.&quot;
<p>If you use Password Manager or Form Manager to save passwords and personal data, this sensitive information is stored on your computer in a file that's difficult, but not impossible, for an intruder to read. This way of storing information is sometimes described as &quot;obscuring.&quot; This is the default setting that applies to information stored by Password Manager or Form Manager.
<p>For improved protection, you may want to protect the file with encryption. Encryption makes it much more difficult for an unauthorized person to view your stored sensitive information.
<p>For improved protection, you may choose to protect the file with encryption. Encryption makes it more difficult (but again, not impossible) for an unauthorized person to view your stored sensitive information.
<ul><li><b>Use encryption when storing sensitive data:</b> Select this checkbox to turn on encryption, or deselect it to turn off encryption.</ul>
@ -80,8 +81,6 @@
<li>If you use obscuring, you may not have to set a master password at all (unless you're using certificates for identification purposes), but it may be easier for a stranger who has access to your computer to steal your passwords.
</ul>
<p>In general, if you are working in an environment where you're confident that strangers cannot walk up to your computer, you probably don't need to use encryption.
<p>For more details, see <a href="using_priv_help.html#using_encrypt">Encrypting Stored Sensitive Information</a>.
<p>&nbsp;</p>
@ -179,7 +178,7 @@
<p>You can control how often the browser requests your master password:
<ul>
<LI><B>The first time it is needed.</B> This setting causes the browser to request your master password only the first time it needs access to the private key database after launching. The browser will not request the master password again until after you exit and relaunch it. This setting provides the lowest level of protection.
<LI><B>The first time it is needed.</B> This setting (selected by default) causes the browser to request your master password only the first time it needs access to the private key database after launching. The browser will not request the master password again until after you exit and relaunch it. This setting provides the lowest level of protection.
<LI><B>Every time it is needed.</B> This setting ensures that the browser will never access your saved personal information without first requesting your master password. This setting provides the highest level of protection.
@ -243,7 +242,9 @@
<p>If someone uses your computer who knows or can guess your master password, that person may be able to access web sites while pretending to be you. This can be dangerous&mdash;for example, if you manage your financial accounts over the Internet.
<p>Therefore, it's important to select a master password that's difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>Therefore, it's important to select a master password that's difficult to guess. The <b>password quality meter</b> gives you a rough idea of the quality of your password as you type it based on factors such as length and the use of uppercase letters, lowercase letters, numbers, and symbols. It does not guarantee, however, that no one will be able to guess your password.
<p>For further guidelines, see the online document <a href="http://home.netscape.com/security/basics/passwords.html" TARGET="_blank">Choosing a Good Password</a>.
<p>It's also important to record your master password in a safe place&mdash;and<b> not </b>anywhere that's easily accessible to someone else. If you forget this password, you may not be able to access important information, such as web sites that require passwords or certificates stored on your computer. </P>
@ -282,7 +283,7 @@
<hr>
<p><i>30 May 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -9,11 +9,14 @@
<body bgcolor="white">
<a NAME="using_maintain"></a>
<a NAME="privacy:protectingIDX"></a>
<hr><h1>Using Privacy Features</h1>
<p>Your browser includes features you can use to safeguard the privacy and security of your personal information. The sections that follow describe how your browser can help you control cookies, passwords, forms, and images while you are surfing the Internet.
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<a NAME="privacy:protectingIDX"></a>
<hr><a NAME="using_maintain"></a>
<h1>Using Privacy Features</h1>
<p>Your browser includes features you can use to enhance the privacy and security of your personal information. The sections that follow describe how your browser can help you control cookies, passwords, forms, and images while you are surfing the Internet.
<p>Some web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. For information on how to customize your browser based on this standard, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
@ -40,11 +43,11 @@
</table>
<p>&nbsp;</p>
<a NAME="sec_maintain"></a>
<a NAME="privacy:aboutIDX"></a>
<hr><h1>Privacy on the Internet</h1>
<hr><a NAME="sec_maintain"></a>
<h1>Privacy on the Internet</h1>
<p>This section summarizes some background information about privacy on the Internet. It also describes several things you can do to help safeguard your own privacy.</p>
<p>This section summarizes some background information about privacy on the Internet. It also describes several things you can do to help safeguard your own privacy. It is not intended to provide a complete description of Internet privacy issues.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -62,7 +65,7 @@
<a NAME="privacy_&amp;_IP_addressSDX"></a>
<h2>What Information Does My Browser Give to a Web Site?</h2>
<p>When your browser displays a web page&mdash;for example, each time you click a link or type a URL&mdash;a small amount of information is given to the site. This information includes your operating environment, your Internet address (<i>not</i> your email address), and the page you're coming from.
<p>When your browser displays a web page--for example, each time you click a link or type a URL, or when a web page is displayed in an email message--it gives certain kinds of information to the site. This information may include (but is not limited to) your operating environment, your Internet address, and the page you're coming from.
<p>&nbsp;</p>
<h3>Operating Environment</h3>
@ -80,12 +83,11 @@ use the French version of Netscape 6.2.3 on a Windows 2000 computer.
<p>Your IP address can be either temporary or fixed (static).
<p>If you connect to the Internet through a standard modem that's attached to your phone line, then your Internet service provider (ISP) may assign you a temporary IP address each time you log on. You use the temporary IP address for the duration of your Internet session. Each ISP has many IP addresses, and they assign the addresses at random to users. A web site can tell which ISP a temporary IP address comes from, but little else.
<p><b>Important:</b> Your IP address is <b>not</b> your email address. Your email address provides personally identifiable information about you much more readily than a temporary IP address can.
<p>If you connect to the Internet through a standard modem that's attached to your phone line, then your Internet service provider (ISP) may assign you a temporary IP address each time you log on. You use the temporary IP address for the duration of your Internet session&mdash;for example, until you sign off or hang up your dial-up connection, or otherwise end your computer's live connection with the Internet. Each ISP has many IP addresses, and they assign the addresses at random to users.
<p>If you have DSL, a cable modem, or a fiber-optic connection, you may have a fixed IP address that you use every time you connect.
<p>Your IP address is not the same as your email address.
<p>&nbsp;</p>
<h3>Referring Page</h3>
@ -102,11 +104,11 @@ which of its pages you came from.
<a NAME="cookies:aboutIDX"></a>
<h2>What Are Cookies, and How Do They Work?</h2>
<p>A cookie is a small bit of information used by some web sites. When you visit the site that uses cookies, the site might ask your browser to place one or more cookies on your hard disk.
<p>A cookie is a small bit of information used by some web sites. When you visit a site that uses cookies, the site might ask your browser to place one or more cookies on your hard disk.
<p>Later, when you return to the site, your browser sends back the cookies that belong to the site.
<p>By default, this activity is invisible to you, and you won't know when a site is setting a cookie or when your browser is sending a web site's cookie back. However, you can set your preferences so that you will be asked before a cookie is set. For information on how to do this, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
<p>When you are using the default cookie settings, this activity is invisible to you, and you won't know when a site is setting a cookie or when your browser is sending a web site's cookie back. However, you can set your preferences so that you will be asked before a cookie is set. For information on how to do this, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
<p>&nbsp;</p>
@ -117,9 +119,9 @@ which of its pages you came from.
<p>Cookies allow a site to know something about your previous visits.
For example, if you typically search for local weather or purchase books at a web site, the site may use cookies to remember what city you live in or what authors you like, so it can make your next visit easier and more useful.
<p>Reputable web sites publish privacy policies that describe how they use the information they receive.
<p>Many web sites publish privacy policies that describe how they use the information they receive.
<p>You can check a web site's privacy policy to see what information it collects, how that information is used, and what choices you have regarding the use of that information. To learn how to do this, see <a href="using_priv_help.html#form_forms">Viewing Privacy Policies</a>.
<p>You can check a web site's privacy policy to see what it says about the information it collects, how that information is used, and what choices you have regarding the use of that information. To learn how to do this, see <a href="using_priv_help.html#form_forms">Viewing Privacy Policies</a>.
<p>For information on how to manage cookies with the aid of published privacy policies, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
</p>
@ -127,17 +129,14 @@ For example, if you typically search for local weather or purchase books at a we
<p>&nbsp;</p>
<a name="privacy_foreign"></a>
<a NAME="third-party_cookiesSDX"></a>
<a NAME="cookies:email_andIDX"></a>
<a NAME="images:email_andIDX"></a>
<a NAME="cookies:foreignIDX"></a>
<h3>What Are Third-Party Cookies?</h3>
<p>If your browser stores a site's cookie, it will return the cookie only to that particular site. Your browser will not provide one site with cookies set by another. Since a web site can only receive its own cookies, it can learn about your activities while you are at that site but not your activities in general while surfing the Web.
<p>But sometimes a web site displays content that is hosted on another web site. That content can be anything from an image to text or an advertisement. The second web site that hosts such elements also has the ability to store a cookie in your browser, even though you don't visit it directly.
<p>But sometimes a web site displays content that is hosted on another web site. That content can be anything from an image to text or an advertisement. The other web site that hosts such elements also has the ability to store a cookie in your browser, even though you don't visit the site directly.
<p>Cookies that are stored by the site other than the one you
think you are visiting are called <b>third-party cookies</b> or <b>foreign cookies.</b> Web sites sometimes use third-party cookies with <b>transparent GIFs</b>, which are special images that help sites count users, track email responses, or customize your browsing experience. (Transparent GIFs are also known as web beacons or web bugs.)
<p>Cookies that are stored by a site other than the one you are visiting are called <b>third-party cookies</b> or <b>foreign cookies.</b> Web sites sometimes use third-party cookies with <b>transparent GIFs</b>, which are special images that help sites count users, track email responses, learn more about how visitors use the site, or customize your browsing experience. (Transparent GIFs are also known as web beacons or web bugs.)
<p>If you want, you can adjust your cookie preferences so that sites can store ordinary cookies but not third-party ones.
@ -145,6 +144,7 @@ think you are visiting are called <b>third-party cookies</b> or <b>foreign cooki
<a name="privacy_email"></a>
<a NAME="Mail &amp; Newsgroups:privacy_optionsIDX"></a>
<a NAME="cookies:email_andIDX"></a>
<a NAME="images:email_andIDX"></a>
<h2>How Can I Control Web Pages in Email Messages?</h2>
<p>You can disable cookies, images, JavaScript, and plug-ins completely for web pages that are received as part of email messages.
@ -165,9 +165,11 @@ think you are visiting are called <b>third-party cookies</b> or <b>foreign cooki
<a NAME="privacy_unauth"></a>
<h2>How Can I Make Sure Unauthorized People Don't Use Information About Me?</h2>
<p>The best way to keep your information private is to be cautious about providing it to others. The Internet is a public network. When you send your name, phone number, address, and other personal information over the network (via a web page, email, or any other method), it is possible, though not likely, that someone else may be able to intercept it.</p>
<p>The best way to keep your information private is to read the privacy policies for the web sites you visit and the Internet services you use, and to be cautious about giving out your personal information online.
<p>If a web site asks for information about you, you should always check the site's privacy policy before proceeding. Here are some questions you might ask about a web site's privacy policy:
<p>The Internet is a public network. When you send your name, phone number, address, and other personal information over the network (via a web page, email, or any other method), it is possible that someone else may be able to intercept it.</p>
<p>Here are some questions you might ask about a web site's privacy policy:
<ul>
<li>What kinds of personal information is this site gathering?
@ -197,7 +199,7 @@ think you are visiting are called <b>third-party cookies</b> or <b>foreign cooki
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<hr>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation.</p>

Просмотреть файл

@ -9,11 +9,14 @@
<body bgcolor="white">
<a NAME="using_maintain"></a>
<a NAME="privacy:protectingIDX"></a>
<hr><h1>Using Privacy Features</h1>
<p>Your browser includes features you can use to safeguard the privacy and security of your personal information. The sections that follow describe how your browser can help you control cookies, passwords, forms, and images while you are surfing the Internet.
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<a NAME="privacy:protectingIDX"></a>
<hr><a NAME="using_maintain"></a>
<h1>Using Privacy Features</h1>
<p>Your browser includes features you can use to enhance the privacy and security of your personal information. The sections that follow describe how your browser can help you control cookies, passwords, forms, and images while you are surfing the Internet.
<p>Some web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. For information on how to customize your browser based on this standard, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
@ -40,11 +43,11 @@
</table>
<p>&nbsp;</p>
<a NAME="sec_maintain"></a>
<a NAME="privacy:aboutIDX"></a>
<hr><h1>Privacy on the Internet</h1>
<hr><a NAME="sec_maintain"></a>
<h1>Privacy on the Internet</h1>
<p>This section summarizes some background information about privacy on the Internet. It also describes several things you can do to help safeguard your own privacy.</p>
<p>This section summarizes some background information about privacy on the Internet. It also describes several things you can do to help safeguard your own privacy. It is not intended to provide a complete description of Internet privacy issues.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -62,7 +65,7 @@
<a NAME="privacy_&amp;_IP_addressSDX"></a>
<h2>What Information Does My Browser Give to a Web Site?</h2>
<p>When your browser displays a web page&mdash;for example, each time you click a link or type a URL&mdash;a small amount of information is given to the site. This information includes your operating environment, your Internet address (<i>not</i> your email address), and the page you're coming from.
<p>When your browser displays a web page--for example, each time you click a link or type a URL, or when a web page is displayed in an email message--it gives certain kinds of information to the site. This information may include (but is not limited to) your operating environment, your Internet address, and the page you're coming from.
<p>&nbsp;</p>
<h3>Operating Environment</h3>
@ -80,12 +83,11 @@ use the French version of Netscape 6.2.3 on a Windows 2000 computer.
<p>Your IP address can be either temporary or fixed (static).
<p>If you connect to the Internet through a standard modem that's attached to your phone line, then your Internet service provider (ISP) may assign you a temporary IP address each time you log on. You use the temporary IP address for the duration of your Internet session. Each ISP has many IP addresses, and they assign the addresses at random to users. A web site can tell which ISP a temporary IP address comes from, but little else.
<p><b>Important:</b> Your IP address is <b>not</b> your email address. Your email address provides personally identifiable information about you much more readily than a temporary IP address can.
<p>If you connect to the Internet through a standard modem that's attached to your phone line, then your Internet service provider (ISP) may assign you a temporary IP address each time you log on. You use the temporary IP address for the duration of your Internet session&mdash;for example, until you sign off or hang up your dial-up connection, or otherwise end your computer's live connection with the Internet. Each ISP has many IP addresses, and they assign the addresses at random to users.
<p>If you have DSL, a cable modem, or a fiber-optic connection, you may have a fixed IP address that you use every time you connect.
<p>Your IP address is not the same as your email address.
<p>&nbsp;</p>
<h3>Referring Page</h3>
@ -102,11 +104,11 @@ which of its pages you came from.
<a NAME="cookies:aboutIDX"></a>
<h2>What Are Cookies, and How Do They Work?</h2>
<p>A cookie is a small bit of information used by some web sites. When you visit the site that uses cookies, the site might ask your browser to place one or more cookies on your hard disk.
<p>A cookie is a small bit of information used by some web sites. When you visit a site that uses cookies, the site might ask your browser to place one or more cookies on your hard disk.
<p>Later, when you return to the site, your browser sends back the cookies that belong to the site.
<p>By default, this activity is invisible to you, and you won't know when a site is setting a cookie or when your browser is sending a web site's cookie back. However, you can set your preferences so that you will be asked before a cookie is set. For information on how to do this, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
<p>When you are using the default cookie settings, this activity is invisible to you, and you won't know when a site is setting a cookie or when your browser is sending a web site's cookie back. However, you can set your preferences so that you will be asked before a cookie is set. For information on how to do this, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
<p>&nbsp;</p>
@ -117,9 +119,9 @@ which of its pages you came from.
<p>Cookies allow a site to know something about your previous visits.
For example, if you typically search for local weather or purchase books at a web site, the site may use cookies to remember what city you live in or what authors you like, so it can make your next visit easier and more useful.
<p>Reputable web sites publish privacy policies that describe how they use the information they receive.
<p>Many web sites publish privacy policies that describe how they use the information they receive.
<p>You can check a web site's privacy policy to see what information it collects, how that information is used, and what choices you have regarding the use of that information. To learn how to do this, see <a href="using_priv_help.html#form_forms">Viewing Privacy Policies</a>.
<p>You can check a web site's privacy policy to see what it says about the information it collects, how that information is used, and what choices you have regarding the use of that information. To learn how to do this, see <a href="using_priv_help.html#form_forms">Viewing Privacy Policies</a>.
<p>For information on how to manage cookies with the aid of published privacy policies, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
</p>
@ -127,17 +129,14 @@ For example, if you typically search for local weather or purchase books at a we
<p>&nbsp;</p>
<a name="privacy_foreign"></a>
<a NAME="third-party_cookiesSDX"></a>
<a NAME="cookies:email_andIDX"></a>
<a NAME="images:email_andIDX"></a>
<a NAME="cookies:foreignIDX"></a>
<h3>What Are Third-Party Cookies?</h3>
<p>If your browser stores a site's cookie, it will return the cookie only to that particular site. Your browser will not provide one site with cookies set by another. Since a web site can only receive its own cookies, it can learn about your activities while you are at that site but not your activities in general while surfing the Web.
<p>But sometimes a web site displays content that is hosted on another web site. That content can be anything from an image to text or an advertisement. The second web site that hosts such elements also has the ability to store a cookie in your browser, even though you don't visit it directly.
<p>But sometimes a web site displays content that is hosted on another web site. That content can be anything from an image to text or an advertisement. The other web site that hosts such elements also has the ability to store a cookie in your browser, even though you don't visit the site directly.
<p>Cookies that are stored by the site other than the one you
think you are visiting are called <b>third-party cookies</b> or <b>foreign cookies.</b> Web sites sometimes use third-party cookies with <b>transparent GIFs</b>, which are special images that help sites count users, track email responses, or customize your browsing experience. (Transparent GIFs are also known as web beacons or web bugs.)
<p>Cookies that are stored by a site other than the one you are visiting are called <b>third-party cookies</b> or <b>foreign cookies.</b> Web sites sometimes use third-party cookies with <b>transparent GIFs</b>, which are special images that help sites count users, track email responses, learn more about how visitors use the site, or customize your browsing experience. (Transparent GIFs are also known as web beacons or web bugs.)
<p>If you want, you can adjust your cookie preferences so that sites can store ordinary cookies but not third-party ones.
@ -145,6 +144,7 @@ think you are visiting are called <b>third-party cookies</b> or <b>foreign cooki
<a name="privacy_email"></a>
<a NAME="Mail &amp; Newsgroups:privacy_optionsIDX"></a>
<a NAME="cookies:email_andIDX"></a>
<a NAME="images:email_andIDX"></a>
<h2>How Can I Control Web Pages in Email Messages?</h2>
<p>You can disable cookies, images, JavaScript, and plug-ins completely for web pages that are received as part of email messages.
@ -165,9 +165,11 @@ think you are visiting are called <b>third-party cookies</b> or <b>foreign cooki
<a NAME="privacy_unauth"></a>
<h2>How Can I Make Sure Unauthorized People Don't Use Information About Me?</h2>
<p>The best way to keep your information private is to be cautious about providing it to others. The Internet is a public network. When you send your name, phone number, address, and other personal information over the network (via a web page, email, or any other method), it is possible, though not likely, that someone else may be able to intercept it.</p>
<p>The best way to keep your information private is to read the privacy policies for the web sites you visit and the Internet services you use, and to be cautious about giving out your personal information online.
<p>If a web site asks for information about you, you should always check the site's privacy policy before proceeding. Here are some questions you might ask about a web site's privacy policy:
<p>The Internet is a public network. When you send your name, phone number, address, and other personal information over the network (via a web page, email, or any other method), it is possible that someone else may be able to intercept it.</p>
<p>Here are some questions you might ask about a web site's privacy policy:
<ul>
<li>What kinds of personal information is this site gathering?
@ -197,7 +199,7 @@ think you are visiting are called <b>third-party cookies</b> or <b>foreign cooki
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<hr>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation.</p>

Просмотреть файл

@ -8,16 +8,21 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="preferences:privacyIDX"></a>
<a NAME="preferences:securityIDX"></a>
<a NAME="privsec_help_first"></a>
<a NAME="security:preferencesIDX"></a>
<a NAME="privacy:preferencesIDX"></a>
<hr><h1>Privacy &amp; Security Preferences </h1>
<h1>Privacy &amp; Security Preferences</h1>
<p>The sections listed below describe the Privacy &amp; Security preferences. To see the preference panels, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<p>(Mac OS X) Open the Netscape menu and choose Preferences.</p>
<li>Click the Privacy &amp; Security category. If no subcategories are visible, double-click Privacy &amp; Security to expand the list, then click the name for the preferences you want to view or change.
</ol>
@ -25,7 +30,7 @@
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>Related sections:</p>
@ -46,7 +51,7 @@
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,16 +8,21 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="preferences:privacyIDX"></a>
<a NAME="preferences:securityIDX"></a>
<a NAME="privsec_help_first"></a>
<a NAME="security:preferencesIDX"></a>
<a NAME="privacy:preferencesIDX"></a>
<hr><h1>Privacy &amp; Security Preferences </h1>
<h1>Privacy &amp; Security Preferences</h1>
<p>The sections listed below describe the Privacy &amp; Security preferences. To see the preference panels, follow these steps:
<ol>
<li>Open the Edit menu and choose Preferences.
<p>(Mac OS X) Open the Netscape menu and choose Preferences.</p>
<li>Click the Privacy &amp; Security category. If no subcategories are visible, double-click Privacy &amp; Security to expand the list, then click the name for the preferences you want to view or change.
</ol>
@ -25,7 +30,7 @@
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>Related sections:</p>
@ -46,7 +51,7 @@
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,13 +8,13 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="settings:sslIDX"></a>
<a NAME="ssl_settings"></a>
<hr><h1>SSL Settings</h1>
<p>This section describes how to set your SSL preferences and ciphers.
<p>&nbsp;</p>
<h1>SSL Settings</h1>
<p>This section describes how to set your SSL preferences and ciphers.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -25,6 +25,7 @@
</td>
</tr>
</table>
<p>&nbsp;</p>
@ -39,9 +40,8 @@
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose SSL. (If no subcategories are visible, double-click Privacy &amp; Security to expand the list.)
<li>Under the Privacy &amp; Security category, choose SSL. (If no subcategories are visible, double-click Privacy &amp; Security to expand the list.)</li>
</ol>
<p>&nbsp;</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -73,6 +73,11 @@ SSL. TLS 1.0 can be thought of as SSL 3.1.
<li><b>Enable SSL version 3:</b> Allows newer web servers to work with the browser.
<li><b>Enable TLS</b>. Allows web servers that support TLS to take advantage of it.</li>
</ul>
<p>To turn individual ciphers on or off, click the Edit Ciphers button:
<ul><li><b>Edit Ciphers</b>. Don't attempt to edit ciphers individually unless you know exactly what you are doing and have cleared the changes with your system administrator. For more information, see <a href="#cipher_help">Edit Ciphers</a>. </li></ul>
<p><b>Important note re TLS:</b> Some servers that do not implement SSL correctly cannot negotiate the SSL handshake with client software (such as the browser) that supports TLS. Such servers are known as "TLS intolerant."
<p>When the Enable TLS option in the SSL preferences panel is selected, the browser attempts to use the TLS protocol when making secure connections with a server. If that connection fails because the server is TLS intolerant, the browser will fall back to using SSL 3.0.
@ -86,10 +91,8 @@ SSL. TLS 1.0 can be thought of as SSL 3.1.
If the connection is encrypted, the lock icon in the lower-right corner of the Navigator
window is locked. If the connection is not encrypted, the lock icon is unlocked.</P>
<p>For many people, the lock icon provides sufficient information about a page's
encryption status. If you want additional warnings, you can select one or more of
the warning checkboxes in the SSL preferences panel. Think
carefully about whether you want such warnings, since they can be annoying.
<p>If you want additional warnings, you can select one or more of
the warning checkboxes in the SSL preferences panel. Some people find these warnings annoying.
<p>To activate any of these Navigator warnings, select the corresponding checkbox:
</P>
@ -119,22 +122,7 @@ information that isn't encrypted. </b>If you send unencrypted information over t
<p>The Edit Ciphers dialog box allows you to select or deselect ciphers, or <a href="glossary.html#cryptographic_algorithm">cryptographic algorithms</a>. Consult your system administrator before changing any of these settings.
<p>Each checkbox corresponds to a cipher suite, or set of cryptographic algorithms. To view info information about a cipher suite, select its name.
<p>The following information is displayed for the selected cipher suite:
<ul>
<li><b>Encryption algorithm:</b> Used for bulk encryption and decryption.
<li><b>Authentication Algorithm:</b> Used to determine the server or client's identity.
<li><b>Key Algorithm:</b> Governs the way in which the server and client determine the symmetric keys they will both use during an SSL session.
<li><b>Key Size:</b> The size of the keys used with this cipher suite. (Encryption strength depends on both encryption algorithm and key size.)
<li><b>MAC Algorithm:</b> Used for tamper detection and data verification; sometimes called message digest or hash algorithm.
<li><b>Other Attributes.</b> These can include the following:</li>
<ul>
<li><b>FIPS.</b> Complies with Federal Information Processing Standards Publications (FIPS PUBS) 140-1. Many products sold to the US government must comply with one or more FIPS standards.
<li><b>IsExportable</b>. Cipher suite was legally exportable under regulations published by the U.S. Department of Commerce that previously limited the encryption strength of exported products. Those regulations have since been loosened.
</ul>
</ul>
<p>Each checkbox corresponds to a cipher suite, or set of cryptographic algorithms.
<p>For more information about ciphers and encryption, see the following on-line documents:
@ -147,7 +135,7 @@ information that isn't encrypted. </b>If you send unencrypted information over t
<p>&nbsp;
<hr>
<p><i>6 June 2002</i></body>
<p><i>13 June 2002</i></body>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,13 +8,13 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="settings:sslIDX"></a>
<a NAME="ssl_settings"></a>
<hr><h1>SSL Settings</h1>
<p>This section describes how to set your SSL preferences and ciphers.
<p>&nbsp;</p>
<h1>SSL Settings</h1>
<p>This section describes how to set your SSL preferences and ciphers.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -25,6 +25,7 @@
</td>
</tr>
</table>
<p>&nbsp;</p>
@ -39,9 +40,8 @@
<ol>
<li>Open the Edit menu and choose Preferences.
<li>Under the Privacy &amp; Security category, choose SSL. (If no subcategories are visible, double-click Privacy &amp; Security to expand the list.)
<li>Under the Privacy &amp; Security category, choose SSL. (If no subcategories are visible, double-click Privacy &amp; Security to expand the list.)</li>
</ol>
<p>&nbsp;</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
@ -73,6 +73,11 @@ SSL. TLS 1.0 can be thought of as SSL 3.1.
<li><b>Enable SSL version 3:</b> Allows newer web servers to work with the browser.
<li><b>Enable TLS</b>. Allows web servers that support TLS to take advantage of it.</li>
</ul>
<p>To turn individual ciphers on or off, click the Edit Ciphers button:
<ul><li><b>Edit Ciphers</b>. Don't attempt to edit ciphers individually unless you know exactly what you are doing and have cleared the changes with your system administrator. For more information, see <a href="#cipher_help">Edit Ciphers</a>. </li></ul>
<p><b>Important note re TLS:</b> Some servers that do not implement SSL correctly cannot negotiate the SSL handshake with client software (such as the browser) that supports TLS. Such servers are known as "TLS intolerant."
<p>When the Enable TLS option in the SSL preferences panel is selected, the browser attempts to use the TLS protocol when making secure connections with a server. If that connection fails because the server is TLS intolerant, the browser will fall back to using SSL 3.0.
@ -86,10 +91,8 @@ SSL. TLS 1.0 can be thought of as SSL 3.1.
If the connection is encrypted, the lock icon in the lower-right corner of the Navigator
window is locked. If the connection is not encrypted, the lock icon is unlocked.</P>
<p>For many people, the lock icon provides sufficient information about a page's
encryption status. If you want additional warnings, you can select one or more of
the warning checkboxes in the SSL preferences panel. Think
carefully about whether you want such warnings, since they can be annoying.
<p>If you want additional warnings, you can select one or more of
the warning checkboxes in the SSL preferences panel. Some people find these warnings annoying.
<p>To activate any of these Navigator warnings, select the corresponding checkbox:
</P>
@ -119,22 +122,7 @@ information that isn't encrypted. </b>If you send unencrypted information over t
<p>The Edit Ciphers dialog box allows you to select or deselect ciphers, or <a href="glossary.html#cryptographic_algorithm">cryptographic algorithms</a>. Consult your system administrator before changing any of these settings.
<p>Each checkbox corresponds to a cipher suite, or set of cryptographic algorithms. To view info information about a cipher suite, select its name.
<p>The following information is displayed for the selected cipher suite:
<ul>
<li><b>Encryption algorithm:</b> Used for bulk encryption and decryption.
<li><b>Authentication Algorithm:</b> Used to determine the server or client's identity.
<li><b>Key Algorithm:</b> Governs the way in which the server and client determine the symmetric keys they will both use during an SSL session.
<li><b>Key Size:</b> The size of the keys used with this cipher suite. (Encryption strength depends on both encryption algorithm and key size.)
<li><b>MAC Algorithm:</b> Used for tamper detection and data verification; sometimes called message digest or hash algorithm.
<li><b>Other Attributes.</b> These can include the following:</li>
<ul>
<li><b>FIPS.</b> Complies with Federal Information Processing Standards Publications (FIPS PUBS) 140-1. Many products sold to the US government must comply with one or more FIPS standards.
<li><b>IsExportable</b>. Cipher suite was legally exportable under regulations published by the U.S. Department of Commerce that previously limited the encryption strength of exported products. Those regulations have since been loosened.
</ul>
</ul>
<p>Each checkbox corresponds to a cipher suite, or set of cryptographic algorithms.
<p>For more information about ciphers and encryption, see the following on-line documents:
@ -147,7 +135,7 @@ information that isn't encrypted. </b>If you send unencrypted information over t
<p>&nbsp;
<hr>
<p><i>6 June 2002</i></body>
<p><i>13 June 2002</i></body>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,7 +8,9 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="certificates:usingIDX"></a>
<a NAME="using_certs_first"></a>
<a NAME="certificates:aboutIDX"></a>
@ -16,13 +18,13 @@
<a NAME="ID_cardSDX"></a>
<a NAME="identitySDX"></a>
<a NAME="digital_IDSDX"></a>
<hr><h1>Using Certificates</h1>
<h1>Using Certificates</h1>
<p>A certificate is the digital equivalent of an ID card. Just as you may have several ID cards for different purposes, such as a driver's license, an employee ID card, or a credit card, you can have several different certificates that identify you for different purposes.</p>
<P>This section describes how to perform operations related to certificates.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -78,19 +80,19 @@
<p>When you're viewing any web page, the lock icon near the lower-right corner of the window informs you whether the entire contents of the page was protected by <a href="glossary.html#encryption">encryption</a> while it was being received by your computer:</p>
<table><tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-secure.gif">&nbsp;</td><td>A closed lock means that the page was protected by encryption when it was received.</td></tr>
<table summary="lock icons"> <tr><td>&nbsp;</td><td><img alt="closed lock icon"src="chrome://communicator/skin/icons/lock-secure.gif">&nbsp;</td><td>A closed lock means that the page was protected by encryption when it was received.</td></tr>
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-insecure.gif">&nbsp;</td><td>An open lock means the page was not protected by encryption when it was received. </td></tr>
<tr><td>&nbsp;</td><td><img alt="open lock icon" src="chrome://communicator/skin/icons/lock-insecure.gif">&nbsp;</td><td>An open lock means the page was not protected by encryption when it was received. </td></tr>
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the elements within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
<tr><td>&nbsp;</td><td><img alt="broken lock icon"src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the elements within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
</table>
<p>For more details about the encryption status of the page when it was received, click the lock icon (or open the View menu, choose Page Info, and click the Security tab).
<p>The Security tab for Page Info provides two kinds of information:
<ul>
<li>The top half describes whether the web site displaying the page has been verified. (For information on certificate verification, see <a href="#using_certs_validation">Controlling Validation</a>.)
<li>The bottom half describes whether the contents of the page you are viewing is protected by encryption while in transit over the network.
<li>The top half describes whether the web site displaying the page has been verified. (For information on certificate verification, see <a href="#using_certs_validation">Controlling Validation</a>.)</li>
<li>The bottom half describes whether the contents of the page you are viewing is protected by encryption while in transit over the network.</li>
</ul>
<p><b>Important:</b> The lock icon describes only the encryption status of the page while it was being received by your computer. To be notified before you send or receive information without encryption, select the appropriate SSL warning options. See <a href="ssl_help.html">Privacy &amp; Security Preferences - SSL</a> for details.
@ -115,7 +117,7 @@
<li>In the Manage Certificates section, click Manage Certificates. You see the Certificate Manager.
</ol>
<p><table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<p><table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -128,7 +130,7 @@
</table>
<p>&nbsp;</p>
<a NAME="using_certs_my"></a><a NAME="certificates:your_ownIDX"></a><a NAME="using_certs_my"></a>
<a NAME="using_certs_my"></a><a NAME="certificates:your_ownIDX"></a>
<H2>Managing Certificates that Identify You</H2>
@ -155,7 +157,7 @@
</p>
<p>&nbsp;</p>
<a NAME="using_certs_others"></a><a NAME="certificates:other peopleIDX"></a><a NAME="using_certs_my"></a>
<a NAME="using_certs_others"></a><a NAME="certificates:other peopleIDX"></a>
<H2>Managing Certificates that Identify Others</H2>
<p><p>When you compose a mail message, you can choose to attach your digital signature to it. A <a href="glossary.html#digital_signature">digital signature</a> allows recipients of the message to verify that the message really comes from you and hasn't been tampered with since you sent it.
@ -236,7 +238,7 @@
<p>A smart card is just one kind of security device. A security device (sometimes called a token) is a hardware or software device that provides cryptographic services and stores information about your identity. Use the Device Manager to work with smart cards and other security devices.
</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -391,14 +393,14 @@
<p>This section describes how Certificate Manager validates certificates and how to control that process. To understand the process, you should have some familiarity with <a href="glossary.html#public-key_cryptography">public-key cryptography</a>. If you are not familiar with the use of certificates, you should check with your system administrator before attempting to change any of your browser's certificate validation settings.<p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#How_Certificate_Validation_Works">How Validation Works</a></p>
<p><a href="#Managing_CRLs">Managing CRLs</a></p>
<p><a href="#Configuring_Certificate_Manager_for_OCSP">Configuring OCSP</a></p>
<p><a href="validation_help.html">Validation Settings</a></p>
<p><a href="#validation_help.html">Validation Settings</a></p>
</td>
</tr>
</table>
@ -409,7 +411,7 @@
<a NAME="OCSP:aboutIDX"></a>
<a NAME="CRLs:aboutIDX"></a>
<a NAME="validation:aboutIDX"></a>
<h2>How Validation Works</h2></a>
<h2>How Validation Works</h2>
<p>Whenever you use or view a certificate stored by Certificate Manager, it takes several steps to verify the certificate. At a minimum, it confirms that the CA's digital signature on the certificate was created by a CA whose own certificate is (1) present in the Certificate Manager's list of available CA certificates and (2) marked as trusted for issuing the kind of certificate being verified.
@ -419,7 +421,7 @@
<p>One way to combat this threat is for Certificate Manager to check a certificate revocation list (CRL) as part of the verification process (see <a href="#Managing_CRLs">Managing CRLs</a>, below). Typically, you download a CRL to your browser by clicking a link. If a CRL is present, Certificate Manager checks any certificate issued by the same CA against the list as part of the verification process.
<p>The reliability of CRLs is subject to the frequency with which they are both updated by a server and checked by a client. You can configure your <a href="validation_help.html#auto_crl_update_prefs">Automatic CRL Update Preferences</a> so that a CRL will be updated automatically at regular intervals with the version currently on the server.
<p>The reliability of CRLs depends on the frequency with which they are both updated by a server and checked by a client. You can configure your <a href="validation_help.html#auto_crl_update_prefs">Automatic CRL Update Preferences</a> so that a CRL will be updated automatically at regular intervals with the version currently on the server.
<p>Another way to combat the threat of compromised certificates is to use a special server that supports the Online Certificate Status Protocol (OCSP). Such a server can answer client queries about individual certificates (see <a href="#Configuring_Certificate_Manager_for_OCSP">Configuring OCSP</a>, below).
@ -427,17 +429,16 @@
<p>&nbsp;</p>
<a name="Managing_CRLs"><h2>Managing CRLs</h2></a>
<a name="Managing_CRLs"></a><h2>Managing CRLs</h2>
<p>A certificate revocation list (CRL) is list of revoked certificates. A <a href="glossary.html#certificate_authority (CA)">certificate authority (CA)</a> might revoke a certificate, for example, if it has been compromised in some way&mdash;much the way a credit card company might revoke your credit card if you report that it's been stolen.
<p>A certificate revocation list (CRL) is list of revoked certificates. A <a href="glossary.html#certificate_authority (CA)">certificate authority (CA)</a> might revoke a certificate, for example, if it has been compromised in some way&mdash;much the way a credit card company might revoke your credit card if you report that it's been stolen.
</p>
<p>This section describes how to import and manage CRLs. <p>For background information, see <a href="#How_Certificate_Validation_Works">How Validation Works</a>.
<p>For detailed descriptions of CRL settings that you can control, see <a href="validation_help.html">Validation Settings</a>.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -480,8 +481,8 @@
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.
<li>Decide how you want to schedule the automatic updates:</li>
<ul>
<li><b>Update X days before Next Update date:</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every X days:</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
<li><b>Update __ days before Next Update date:</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every __ days:</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
</ul>
<li>Click OK to confirm your choices.
</ol>
@ -502,18 +503,18 @@
<p>To set up automatic updates for a CRL, select the CRL and click Settings. The Automatic CRL Update Preferences dialog box appears:
<ol>
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.</li>
<li>Decide how you want to schedule the automatic updates:</li>
<ul>
<li><b>Update X days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every X days.</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
<li><b>Update __ days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every __ days.</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.</li>
</ul>
<li>Click OK to confirm your choices.
<li>Click OK to confirm your choices.</li>
</ol>
<p>&nbsp;</p>
<a name="Configuring_Certificate_Manager_for_OCSP"><h2>Configuring OCSP</h2></a>
<a name="Configuring_Certificate_Manager_for_OCSP"></a><h2>Configuring OCSP</h2>
<p>The settings that control OCSP are part of Validation preferences. To view Validation preferences, follow these steps:
@ -531,7 +532,7 @@
<hr>
<p><i>9 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -8,7 +8,9 @@
</head>
<body bgcolor="white">
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr>
<a NAME="certificates:usingIDX"></a>
<a NAME="using_certs_first"></a>
<a NAME="certificates:aboutIDX"></a>
@ -16,13 +18,13 @@
<a NAME="ID_cardSDX"></a>
<a NAME="identitySDX"></a>
<a NAME="digital_IDSDX"></a>
<hr><h1>Using Certificates</h1>
<h1>Using Certificates</h1>
<p>A certificate is the digital equivalent of an ID card. Just as you may have several ID cards for different purposes, such as a driver's license, an employee ID card, or a credit card, you can have several different certificates that identify you for different purposes.</p>
<P>This section describes how to perform operations related to certificates.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -78,19 +80,19 @@
<p>When you're viewing any web page, the lock icon near the lower-right corner of the window informs you whether the entire contents of the page was protected by <a href="glossary.html#encryption">encryption</a> while it was being received by your computer:</p>
<table><tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-secure.gif">&nbsp;</td><td>A closed lock means that the page was protected by encryption when it was received.</td></tr>
<table summary="lock icons"> <tr><td>&nbsp;</td><td><img alt="closed lock icon"src="chrome://communicator/skin/icons/lock-secure.gif">&nbsp;</td><td>A closed lock means that the page was protected by encryption when it was received.</td></tr>
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-insecure.gif">&nbsp;</td><td>An open lock means the page was not protected by encryption when it was received. </td></tr>
<tr><td>&nbsp;</td><td><img alt="open lock icon" src="chrome://communicator/skin/icons/lock-insecure.gif">&nbsp;</td><td>An open lock means the page was not protected by encryption when it was received. </td></tr>
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the elements within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
<tr><td>&nbsp;</td><td><img alt="broken lock icon"src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the elements within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
</table>
<p>For more details about the encryption status of the page when it was received, click the lock icon (or open the View menu, choose Page Info, and click the Security tab).
<p>The Security tab for Page Info provides two kinds of information:
<ul>
<li>The top half describes whether the web site displaying the page has been verified. (For information on certificate verification, see <a href="#using_certs_validation">Controlling Validation</a>.)
<li>The bottom half describes whether the contents of the page you are viewing is protected by encryption while in transit over the network.
<li>The top half describes whether the web site displaying the page has been verified. (For information on certificate verification, see <a href="#using_certs_validation">Controlling Validation</a>.)</li>
<li>The bottom half describes whether the contents of the page you are viewing is protected by encryption while in transit over the network.</li>
</ul>
<p><b>Important:</b> The lock icon describes only the encryption status of the page while it was being received by your computer. To be notified before you send or receive information without encryption, select the appropriate SSL warning options. See <a href="ssl_help.html">Privacy &amp; Security Preferences - SSL</a> for details.
@ -115,7 +117,7 @@
<li>In the Manage Certificates section, click Manage Certificates. You see the Certificate Manager.
</ol>
<p><table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<p><table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -128,7 +130,7 @@
</table>
<p>&nbsp;</p>
<a NAME="using_certs_my"></a><a NAME="certificates:your_ownIDX"></a><a NAME="using_certs_my"></a>
<a NAME="using_certs_my"></a><a NAME="certificates:your_ownIDX"></a>
<H2>Managing Certificates that Identify You</H2>
@ -155,7 +157,7 @@
</p>
<p>&nbsp;</p>
<a NAME="using_certs_others"></a><a NAME="certificates:other peopleIDX"></a><a NAME="using_certs_my"></a>
<a NAME="using_certs_others"></a><a NAME="certificates:other peopleIDX"></a>
<H2>Managing Certificates that Identify Others</H2>
<p><p>When you compose a mail message, you can choose to attach your digital signature to it. A <a href="glossary.html#digital_signature">digital signature</a> allows recipients of the message to verify that the message really comes from you and hasn't been tampered with since you sent it.
@ -236,7 +238,7 @@
<p>A smart card is just one kind of security device. A security device (sometimes called a token) is a hardware or software device that provides cryptographic services and stores information about your identity. Use the Device Manager to work with smart cards and other security devices.
</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -391,14 +393,14 @@
<p>This section describes how Certificate Manager validates certificates and how to control that process. To understand the process, you should have some familiarity with <a href="glossary.html#public-key_cryptography">public-key cryptography</a>. If you are not familiar with the use of certificates, you should check with your system administrator before attempting to change any of your browser's certificate validation settings.<p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#How_Certificate_Validation_Works">How Validation Works</a></p>
<p><a href="#Managing_CRLs">Managing CRLs</a></p>
<p><a href="#Configuring_Certificate_Manager_for_OCSP">Configuring OCSP</a></p>
<p><a href="validation_help.html">Validation Settings</a></p>
<p><a href="#validation_help.html">Validation Settings</a></p>
</td>
</tr>
</table>
@ -409,7 +411,7 @@
<a NAME="OCSP:aboutIDX"></a>
<a NAME="CRLs:aboutIDX"></a>
<a NAME="validation:aboutIDX"></a>
<h2>How Validation Works</h2></a>
<h2>How Validation Works</h2>
<p>Whenever you use or view a certificate stored by Certificate Manager, it takes several steps to verify the certificate. At a minimum, it confirms that the CA's digital signature on the certificate was created by a CA whose own certificate is (1) present in the Certificate Manager's list of available CA certificates and (2) marked as trusted for issuing the kind of certificate being verified.
@ -419,7 +421,7 @@
<p>One way to combat this threat is for Certificate Manager to check a certificate revocation list (CRL) as part of the verification process (see <a href="#Managing_CRLs">Managing CRLs</a>, below). Typically, you download a CRL to your browser by clicking a link. If a CRL is present, Certificate Manager checks any certificate issued by the same CA against the list as part of the verification process.
<p>The reliability of CRLs is subject to the frequency with which they are both updated by a server and checked by a client. You can configure your <a href="validation_help.html#auto_crl_update_prefs">Automatic CRL Update Preferences</a> so that a CRL will be updated automatically at regular intervals with the version currently on the server.
<p>The reliability of CRLs depends on the frequency with which they are both updated by a server and checked by a client. You can configure your <a href="validation_help.html#auto_crl_update_prefs">Automatic CRL Update Preferences</a> so that a CRL will be updated automatically at regular intervals with the version currently on the server.
<p>Another way to combat the threat of compromised certificates is to use a special server that supports the Online Certificate Status Protocol (OCSP). Such a server can answer client queries about individual certificates (see <a href="#Configuring_Certificate_Manager_for_OCSP">Configuring OCSP</a>, below).
@ -427,17 +429,16 @@
<p>&nbsp;</p>
<a name="Managing_CRLs"><h2>Managing CRLs</h2></a>
<a name="Managing_CRLs"></a><h2>Managing CRLs</h2>
<p>A certificate revocation list (CRL) is list of revoked certificates. A <a href="glossary.html#certificate_authority (CA)">certificate authority (CA)</a> might revoke a certificate, for example, if it has been compromised in some way&mdash;much the way a credit card company might revoke your credit card if you report that it's been stolen.
<p>A certificate revocation list (CRL) is list of revoked certificates. A <a href="glossary.html#certificate_authority (CA)">certificate authority (CA)</a> might revoke a certificate, for example, if it has been compromised in some way&mdash;much the way a credit card company might revoke your credit card if you report that it's been stolen.
</p>
<p>This section describes how to import and manage CRLs. <p>For background information, see <a href="#How_Certificate_Validation_Works">How Validation Works</a>.
<p>For detailed descriptions of CRL settings that you can control, see <a href="validation_help.html">Validation Settings</a>.</p>
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<table summary="list of headings" cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=324>
<tr>
<td class="inthissection">
<p>In this section:</p>
@ -480,8 +481,8 @@
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.
<li>Decide how you want to schedule the automatic updates:</li>
<ul>
<li><b>Update X days before Next Update date:</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every X days:</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
<li><b>Update __ days before Next Update date:</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every __ days:</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
</ul>
<li>Click OK to confirm your choices.
</ol>
@ -502,18 +503,18 @@
<p>To set up automatic updates for a CRL, select the CRL and click Settings. The Automatic CRL Update Preferences dialog box appears:
<ol>
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.
<li>Select the option labeled &quot;Enable Automatic Update for this CRL&quot;.</li>
<li>Decide how you want to schedule the automatic updates:</li>
<ul>
<li><b>Update X days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every X days.</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.
<li><b>Update __ days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
<li><b>Update every __ days.</b> Select this option if you want to specify an update interval unrelated to the CRL's Next Update date.</li>
</ul>
<li>Click OK to confirm your choices.
<li>Click OK to confirm your choices.</li>
</ol>
<p>&nbsp;</p>
<a name="Configuring_Certificate_Manager_for_OCSP"><h2>Configuring OCSP</h2></a>
<a name="Configuring_Certificate_Manager_for_OCSP"></a><h2>Configuring OCSP</h2>
<p>The settings that control OCSP are part of Validation preferences. To view Validation preferences, follow these steps:
@ -531,7 +532,7 @@
<hr>
<p><i>9 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Просмотреть файл

@ -11,6 +11,7 @@
<a NAME="validation_settings"></a>
<a NAME="validation:settingsIDX"></a>
<a NAME="settings:validationIDX"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr><h1>Validation Settings</h1>
@ -177,7 +178,7 @@
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -11,6 +11,7 @@
<a NAME="validation_settings"></a>
<a NAME="validation:settingsIDX"></a>
<a NAME="settings:validationIDX"></a>
<div class="boilerplate">This document is provided by Netscape for your information only. It may help you take certain steps to protect the privacy and security of your personal information on the Internet. This document does not, however, address all online privacy and security issues, nor does it represent a recommendation by Netscape about what consitutes adequate privacy and security protection on the Internet.</div>
<hr><h1>Validation Settings</h1>
@ -177,7 +178,7 @@
<hr>
<p><i>6 June 2002</i></p>
<p><i>13 June 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>