From 287e35347d2d758aee8a7911847d7f44e28267aa Mon Sep 17 00:00:00 2001 From: "cotter%netscape.com" Date: Wed, 24 Apr 2002 23:37:26 +0000 Subject: [PATCH] ongoing help content updates per bugzilla 122806 & ADT, r=oeschger; various content updates --- .../resources/locale/en-US/mail_sec_help.html | 62 +++++++++++-------- .../locale/en-US/mail_sec_help.xhtml | 62 +++++++++++-------- .../resources/locale/en-US/privacy_help.html | 4 +- .../resources/locale/en-US/privacy_help.xhtml | 4 +- .../locale/en-US/using_priv_help.html | 13 ++-- .../locale/en-US/using_priv_help.xhtml | 13 ++-- 6 files changed, 96 insertions(+), 62 deletions(-) diff --git a/extensions/help/resources/locale/en-US/mail_sec_help.html b/extensions/help/resources/locale/en-US/mail_sec_help.html index bdeffb2d2e2..fa97e2a4c60 100644 --- a/extensions/help/resources/locale/en-US/mail_sec_help.html +++ b/extensions/help/resources/locale/en-US/mail_sec_help.html @@ -11,6 +11,12 @@ + + + + + +

Signing & Encrypting Messages

@@ -31,13 +37,12 @@ -

  +

 

- -

-About Digital Signatures & Encryption

+ +

About Digital Signatures & Encryption

When you compose a mail or newsgroup message, you can choose to attach your digital signature to it. A digital signature allows recipients of the message to verify that the message really comes from you and hasn't been tampered with since you sent it. @@ -59,9 +64,9 @@ About Digital Signatures & Encryption

The sections that follow provide a brief overview of how digital signatures and encryption work. For more technical details on this subject, see the online document Introduction to Public-Key Cryptography. -

  -

-How Digital Signatures Work

+

 

+ +

How Digital Signatures Work

A digital signature is a special code, unique to each message, created by means of public-key cryptography. @@ -78,8 +83,9 @@ How Digital Signatures Work -

  -

+

 

+ +

How Encryption Works

To encrypt an email message, you must have an encryption certificate for each of the message's recipients. The public key in each certificate is used to encrypt the message for that recipient. @@ -88,8 +94,9 @@ How Encryption Works

The recipient's software uses the recipient's private key, which remains on that person's computer, to decrypt the message. -

  -

Getting Other People's Certificates

+

 

+ +

Getting Other People's Certificates

Every time you send a digitally signed message, your encryption certificate is automatically included with the message. Therefore, one of the easiest ways to obtain someone else's certificate is for that person to send you a digitally signed message. @@ -98,9 +105,10 @@ How Encryption Works

You can also obtain certificates by looking them up in a public directory, such as the "phonebook" directories maintained by many companies. -

  +

 

-

Configuring Security Settings

+ +

Configuring Security Settings

Once you have obtained an email certificate (or certificates), you must specify the certificates you want to use for signing and encrypting messages. @@ -136,9 +144,9 @@ How Encryption Works

When you have finished configuring your mail security settings, click OK to confirm them. -

  - -

Signing & Encrypting a New Message

+

 

+ +

Signing & Encrypting a New Message

Before you can digitally sign or encrypt any message, you must obtain at least one email certificate and configure your mail security settings correctly. For background information on these tasks, see About Digital Signatures & Encryption. @@ -159,9 +167,11 @@ How Encryption Works

To see more detailed information about the message's security, click the key or lock icon, or follow the instructions in Message Security - Compose. -

  - -

Reading Signed & Encrypted Messages

+

 

+ + + +

Reading Signed & Encrypted Messages

When you view a signed or encrypted message in the Mail window, these icons near the upper-right corner of the message header indicate the security status of the message:

@@ -173,9 +183,11 @@ How Encryption Works

To see more detailed information about the message's security, click the key or lock icon, or follow the instructions in Message Security - Received Message. -

  +

 

-
+ + +

Message Security - Compose

This section describes the Message Security window that you can open for any message you are composing. If you're not already viewing Message Security, click the Security icon in the toolbar of the Compose window. @@ -217,10 +229,10 @@ How Encryption Works -

  +

 

- -

Message Security - Received Message

+ +

Message Security - Received Message

This section describes the Message Security window that you can open for any message you have received. If you're not already viewing Message Security for a received message, follow these steps: @@ -255,7 +267,7 @@ How Encryption Works


-

19 April 2002

+

24 April 2002

Copyright © 1994-2002 Netscape Communications Corporation.

diff --git a/extensions/help/resources/locale/en-US/mail_sec_help.xhtml b/extensions/help/resources/locale/en-US/mail_sec_help.xhtml index bdeffb2d2e2..fa97e2a4c60 100644 --- a/extensions/help/resources/locale/en-US/mail_sec_help.xhtml +++ b/extensions/help/resources/locale/en-US/mail_sec_help.xhtml @@ -11,6 +11,12 @@ + + + + + +

Signing & Encrypting Messages

@@ -31,13 +37,12 @@ -

  +

 

- -

-About Digital Signatures & Encryption

+ +

About Digital Signatures & Encryption

When you compose a mail or newsgroup message, you can choose to attach your digital signature to it. A digital signature allows recipients of the message to verify that the message really comes from you and hasn't been tampered with since you sent it. @@ -59,9 +64,9 @@ About Digital Signatures & Encryption

The sections that follow provide a brief overview of how digital signatures and encryption work. For more technical details on this subject, see the online document Introduction to Public-Key Cryptography. -

  -

-How Digital Signatures Work

+

 

+ +

How Digital Signatures Work

A digital signature is a special code, unique to each message, created by means of public-key cryptography. @@ -78,8 +83,9 @@ How Digital Signatures Work -

  -

+

 

+ +

How Encryption Works

To encrypt an email message, you must have an encryption certificate for each of the message's recipients. The public key in each certificate is used to encrypt the message for that recipient. @@ -88,8 +94,9 @@ How Encryption Works

The recipient's software uses the recipient's private key, which remains on that person's computer, to decrypt the message. -

  -

Getting Other People's Certificates

+

 

+ +

Getting Other People's Certificates

Every time you send a digitally signed message, your encryption certificate is automatically included with the message. Therefore, one of the easiest ways to obtain someone else's certificate is for that person to send you a digitally signed message. @@ -98,9 +105,10 @@ How Encryption Works

You can also obtain certificates by looking them up in a public directory, such as the "phonebook" directories maintained by many companies. -

  +

 

-

Configuring Security Settings

+ +

Configuring Security Settings

Once you have obtained an email certificate (or certificates), you must specify the certificates you want to use for signing and encrypting messages. @@ -136,9 +144,9 @@ How Encryption Works

When you have finished configuring your mail security settings, click OK to confirm them. -

  - -

Signing & Encrypting a New Message

+

 

+ +

Signing & Encrypting a New Message

Before you can digitally sign or encrypt any message, you must obtain at least one email certificate and configure your mail security settings correctly. For background information on these tasks, see About Digital Signatures & Encryption. @@ -159,9 +167,11 @@ How Encryption Works

To see more detailed information about the message's security, click the key or lock icon, or follow the instructions in Message Security - Compose. -

  - -

Reading Signed & Encrypted Messages

+

 

+ + + +

Reading Signed & Encrypted Messages

When you view a signed or encrypted message in the Mail window, these icons near the upper-right corner of the message header indicate the security status of the message:

@@ -173,9 +183,11 @@ How Encryption Works

To see more detailed information about the message's security, click the key or lock icon, or follow the instructions in Message Security - Received Message. -

  +

 

-
+ + +

Message Security - Compose

This section describes the Message Security window that you can open for any message you are composing. If you're not already viewing Message Security, click the Security icon in the toolbar of the Compose window. @@ -217,10 +229,10 @@ How Encryption Works -

  +

 

- -

Message Security - Received Message

+ +

Message Security - Received Message

This section describes the Message Security window that you can open for any message you have received. If you're not already viewing Message Security for a received message, follow these steps: @@ -255,7 +267,7 @@ How Encryption Works


-

19 April 2002

+

24 April 2002

Copyright © 1994-2002 Netscape Communications Corporation.

diff --git a/extensions/help/resources/locale/en-US/privacy_help.html b/extensions/help/resources/locale/en-US/privacy_help.html index 8ebfca53af5..dedfce7408d 100644 --- a/extensions/help/resources/locale/en-US/privacy_help.html +++ b/extensions/help/resources/locale/en-US/privacy_help.html @@ -92,6 +92,7 @@ you unless you allow it.

 

+

What Information Does My Browser Give to a Web Site?

When your browser displays a web page—for example, each time you click a link or type a URL—a small amount of information is given to the site. This information includes your operating environment, your Internet address (not your email address), and the page you're coming from. @@ -218,6 +219,7 @@ you want your browser to accept. +

How Can I Browse Anonymously?

@@ -245,7 +247,7 @@ search engine to find them---try search words such as "anonymous browsing&q
-

9 April 2002

+

24 April 2002


Copyright © 1998-2002 Netscape Communications Corporation.

diff --git a/extensions/help/resources/locale/en-US/privacy_help.xhtml b/extensions/help/resources/locale/en-US/privacy_help.xhtml index 8ebfca53af5..dedfce7408d 100644 --- a/extensions/help/resources/locale/en-US/privacy_help.xhtml +++ b/extensions/help/resources/locale/en-US/privacy_help.xhtml @@ -92,6 +92,7 @@ you unless you allow it.

 

+

What Information Does My Browser Give to a Web Site?

When your browser displays a web page—for example, each time you click a link or type a URL—a small amount of information is given to the site. This information includes your operating environment, your Internet address (not your email address), and the page you're coming from. @@ -218,6 +219,7 @@ you want your browser to accept. +

How Can I Browse Anonymously?

@@ -245,7 +247,7 @@ search engine to find them---try search words such as "anonymous browsing&q
-

9 April 2002

+

24 April 2002


Copyright © 1998-2002 Netscape Communications Corporation.

diff --git a/extensions/help/resources/locale/en-US/using_priv_help.html b/extensions/help/resources/locale/en-US/using_priv_help.html index 035ea782660..efb1059bb18 100644 --- a/extensions/help/resources/locale/en-US/using_priv_help.html +++ b/extensions/help/resources/locale/en-US/using_priv_help.html @@ -123,6 +123,7 @@ Using the Cookie Manager

 

+

Setting Privacy Levels

Many web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. A web site's privacy policy describes what kind of information the site collects, to whom it gives that information, and how it uses the information. @@ -148,7 +149,7 @@ Using the Cookie Manager

When the "custom" option is selected, you can define your own privacy policy. For each type of site listed under Cookie Acceptance Policy, and for each type of cookie, you can select whether you want the Cookie Manager to accept the cookie permanently, reject it permanently, accept it just for the current session (that is, until you exit the browser), or flag it. -

If you choose Flag for a given category, the Cookie Manager displays the cookie notification icon near the lower-right corner of the browser window whenever a web site that fits the category sets a cookie. When this icon is displayed, you can click it to get information about the affected cookies. +

If you choose Flag or Session for a given category, the Cookie Manager displays the cookie notification icon () near the lower-right corner of the browser window whenever a web site that fits the category sets a cookie. When this icon is displayed, you can click it to get information about the affected cookies.

"First party cookies" are cookies set by the site you are visiting. "Third party cookies," also known as foreign cookies, are set by a sites other than the one you are viewing, and are therefore considered more dangerous. @@ -365,7 +366,7 @@ Using the Cookie Manager