ongoing help content updates per bugzilla 122806 & ADT, r=oeschger; misc. privacy & security updates, corrections

This commit is contained in:
cotter%netscape.com 2002-05-09 22:22:37 +00:00
Родитель 1f2e24732a
Коммит 333002a037
12 изменённых файлов: 71 добавлений и 168 удалений

Просмотреть файл

@ -209,6 +209,9 @@ Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US
<p><a name="foreign_cookie"></a>
<b>foreign cookie.</b>&nbsp;A cookie from one site that gets stored on your computer when you visit a different site. For example you might visit <tt>www.example.com</tt>, which displays an image from a different site called <tt>www.example.net</tt>. So when you visit <tt>www.example.com</tt> your browser makes a side-trip to <tt>www.example.net</tt> to get the image, and <tt>www.example.net</tt> stores the cookie at that time. <p>
<p><a name="helper_application"></a>
<b>helper application.</b>&nbsp;Any application that is used to open or view a file downloaded by the browser. A <a href="#plug-in">plug-in</a> is a special kind of helper application that installs itself into the Plugins directory of the main browser installation directory and can typically be opened within the browser itself (internally). Microsoft Word, Adobe Photoshop, and other external applications are considered helper applications but not plug-ins, since they don't install themselves into the browser directory, but can be opened from the download dialog box.
<p><a name="home_page"></a>
<b>home page.</b>&nbsp;The page your browser is set to display every time you launch it or when you click the Home button. Also used to refer to the main page for a web site, from which you can explore the rest of the site.<p>
@ -309,8 +312,11 @@ The public-key cryptography standard that governs security devices such as smart
A program on your computer that manages cryptographic services such as encryption and decryption using the PKCS #11 standard. Also called <I>cryptographic modules</I>, <I>cryptographic service providers,</I> or <I>security modules</I>, PKCS #11 modules control either hardware or software devices. A PKCS #11 module always controls one or more slots, which may be implemented as some form of physical reader (for example, for reading smart cards) or in software. Each slot for a PKCS #11 module can in turn contain a <a href="glossary.html#1028962">security device</a> (also called <I>token</I>)<B>,</B> which is the hardware or software device that provides cryptographic services and stores certificates and keys. Certificate Manager provides two built-in PKCS #11 modules. You may install additional modules on your computer to control smart card readers or other hardware devices.<P>
</A>
<p><a name="p3p"></a>
<b>Platform for Privacy Preferences (P3P).</b>&nbsp;An industry standard published by the World Wide Web Consortium (W3C) designed to help users to gain more control over the use of personal information by Web sites they visit. For information about using cookies with web sites that support this standard, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>. For general information on the standard itself, see the online document <a href="http://www.w3.org/P3P/" target="_blank">P3P Public Overview.<p>
<p><a name="plug-in"></a>
<b>plug-in.</b>&nbsp;A small application that adds new capabilities to your browser, such as programs for playing audio or video clips. For example, an audio plug-in lets you listen to audio files on a web page or in an e-mail message.<p>
<b>plug-in.</b>&nbsp;A type of <a href="#helper_application">helper application</a> that adds new capabilities to your browser, such as the ability to play audio or video clips. Unlike other kinds of helper applications, a plug-in application installs itself into the Plugins directory within the main browser installation directory and typically can be opened within the browser itself (internally). For example, an audio plug-in lets you listen to audio files on a web page or in an e-mail message. Macromedia Flash Player and Java are both examples of plug-in applications.<p>
<p><a NAME="POP_glossary"></a>
<b>Post Office Protocol (POP).</b>&nbsp;A standard mail server protocol that requires you to download new messages to your local computer&mdash;although you can choose to leave copies on the server. With POP, you can store all your messages, including sent mail, drafts, and custom folders, on one computer only. By contrast, <a href="#IMAP_glossary">IMAP</a> allows you to permanently store all your messages and any changes to them on the server, where you can access them from any computer. Most ISPs currently support POP. <p>
@ -526,7 +532,7 @@ Confident reliance on a person or other entity. In the context of <a href="gloss
</p>
<hr>
<p><i>30 April 2002</i></p>
<p><i>9 May 2002</i></p>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation</p>
<BR>

Просмотреть файл

@ -209,6 +209,9 @@ Federal Information Processing Standards Publications (FIPS PUBS) 140-1 is a US
<p><a name="foreign_cookie"></a>
<b>foreign cookie.</b>&nbsp;A cookie from one site that gets stored on your computer when you visit a different site. For example you might visit <tt>www.example.com</tt>, which displays an image from a different site called <tt>www.example.net</tt>. So when you visit <tt>www.example.com</tt> your browser makes a side-trip to <tt>www.example.net</tt> to get the image, and <tt>www.example.net</tt> stores the cookie at that time. <p>
<p><a name="helper_application"></a>
<b>helper application.</b>&nbsp;Any application that is used to open or view a file downloaded by the browser. A <a href="#plug-in">plug-in</a> is a special kind of helper application that installs itself into the Plugins directory of the main browser installation directory and can typically be opened within the browser itself (internally). Microsoft Word, Adobe Photoshop, and other external applications are considered helper applications but not plug-ins, since they don't install themselves into the browser directory, but can be opened from the download dialog box.
<p><a name="home_page"></a>
<b>home page.</b>&nbsp;The page your browser is set to display every time you launch it or when you click the Home button. Also used to refer to the main page for a web site, from which you can explore the rest of the site.<p>
@ -309,8 +312,11 @@ The public-key cryptography standard that governs security devices such as smart
A program on your computer that manages cryptographic services such as encryption and decryption using the PKCS #11 standard. Also called <I>cryptographic modules</I>, <I>cryptographic service providers,</I> or <I>security modules</I>, PKCS #11 modules control either hardware or software devices. A PKCS #11 module always controls one or more slots, which may be implemented as some form of physical reader (for example, for reading smart cards) or in software. Each slot for a PKCS #11 module can in turn contain a <a href="glossary.html#1028962">security device</a> (also called <I>token</I>)<B>,</B> which is the hardware or software device that provides cryptographic services and stores certificates and keys. Certificate Manager provides two built-in PKCS #11 modules. You may install additional modules on your computer to control smart card readers or other hardware devices.<P>
</A>
<p><a name="p3p"></a>
<b>Platform for Privacy Preferences (P3P).</b>&nbsp;An industry standard published by the World Wide Web Consortium (W3C) designed to help users to gain more control over the use of personal information by Web sites they visit. For information about using cookies with web sites that support this standard, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>. For general information on the standard itself, see the online document <a href="http://www.w3.org/P3P/" target="_blank">P3P Public Overview.<p>
<p><a name="plug-in"></a>
<b>plug-in.</b>&nbsp;A small application that adds new capabilities to your browser, such as programs for playing audio or video clips. For example, an audio plug-in lets you listen to audio files on a web page or in an e-mail message.<p>
<b>plug-in.</b>&nbsp;A type of <a href="#helper_application">helper application</a> that adds new capabilities to your browser, such as the ability to play audio or video clips. Unlike other kinds of helper applications, a plug-in application installs itself into the Plugins directory within the main browser installation directory and typically can be opened within the browser itself (internally). For example, an audio plug-in lets you listen to audio files on a web page or in an e-mail message. Macromedia Flash Player and Java are both examples of plug-in applications.<p>
<p><a NAME="POP_glossary"></a>
<b>Post Office Protocol (POP).</b>&nbsp;A standard mail server protocol that requires you to download new messages to your local computer&mdash;although you can choose to leave copies on the server. With POP, you can store all your messages, including sent mail, drafts, and custom folders, on one computer only. By contrast, <a href="#IMAP_glossary">IMAP</a> allows you to permanently store all your messages and any changes to them on the server, where you can access them from any computer. Most ISPs currently support POP. <p>
@ -526,7 +532,7 @@ Confident reliance on a person or other entity. In the context of <a href="gloss
</p>
<hr>
<p><i>30 April 2002</i></p>
<p><i>9 May 2002</i></p>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation</p>
<BR>

Просмотреть файл

@ -42,6 +42,7 @@
<rdf:li> <rdf:Description nc:name="fingerprint" nc:link="glossary.html#1020434"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="FIPS PUBS 140-1" nc:link="glossary.html#1025742"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="foreign cookie" nc:link="glossary.html#foreign_cookie"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="helper application" nc:link="glossary.html#helper_application"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="home page" nc:link="glossary.html#home_page"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Hypertext Markup Language (HTML)" nc:link="glossary.html#Hypertext_Markup_Language_(HTML)"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="implicit consent" nc:link="glossary.html#implicit_consent"/> </rdf:li>
@ -62,6 +63,7 @@
<rdf:li> <rdf:Description nc:name="password-based authentication" nc:link="glossary.html#1014123"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="PKCS #11" nc:link="glossary.html#1025194"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="PKCS #11 module" nc:link="glossary.html#1025197"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Platform for Privacy Preferences (P3P)" nc:link="glossary.html#p3p"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="plug-in" nc:link="glossary.html#plug-in"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="Post Office Protocol (POP)" nc:link="glossary.html#POP_glossary"/> </rdf:li>
<rdf:li> <rdf:Description nc:name="private key" nc:link="glossary.html#1015387"/> </rdf:li>

Просмотреть файл

@ -15,12 +15,13 @@
<p>On the Internet, information moves back and forth across public lines and through numerous connections. Without adequate protection, the privacy of personal information stored on your computer or transmitted over the Internet can be compromised in a variety of ways.</p>
<p>Fortunately, your browser includes features you can use to safeguard the privacy and security of your personal information at all times. The sections that follow describe how Netscape helps you control cookies, passwords, forms, and images while you are surfing the Internet.
<p>Many web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. For information on how to take advantage of this emerging privacy standard, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
<p>For information about related Netscape security features, see <a href="mail_sec_help.html">Signing &amp; Encrypting Messages</a> and <a href="using_certs_help.html">Using Certificates</a>.
<p>For general information about prifvacy and security, including descriptions of viruses, safe online shopping and banking, and safe surfing for children, see the online document
<p>For general information about privacy and security, including descriptions of viruses, safe online shopping and banking, and safe surfing for children, see the online document
<a href="http://home.netscape.com/security/basics/index.html?cp=sciln" target="_blank">Understanding Security</a>.</p>
@ -164,7 +165,8 @@ for potential dog owners who do not have valid dog licenses.
<p>Web sites can use cookie information to tailor their presentations to you, and advertisers can use such information to target online ads to your interests and buying information. Reputable web sites have privacy policies that describe how they use the information they receive.
<p>When in doubt, always check a web site's privacy policy before permitting a cookie to be set, and before providing any personal information (such as your name and email address).</p>
<p>When in doubt, check a web site's privacy policy before permitting a cookie to be set and before providing any personal information (such as your name and email address). To learn how to do this, see <a href="using_priv_help.html#form_forms">Viewing Privacy Policies</a>. For information on how to manage cookies with the aid of published privacy policies, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
</p>
<a name="privacy_foreign"></a>
<a NAME="cookies:foreignIDX"></a>
@ -245,7 +247,7 @@ search engine to find them---try search words such as &quot;anonymous browsing&q
<hr>
<p><i>8 May 2002</i></p>
<p><i>9 May 2002</i></p>
<hr>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation.</p>

Просмотреть файл

@ -15,12 +15,13 @@
<p>On the Internet, information moves back and forth across public lines and through numerous connections. Without adequate protection, the privacy of personal information stored on your computer or transmitted over the Internet can be compromised in a variety of ways.</p>
<p>Fortunately, your browser includes features you can use to safeguard the privacy and security of your personal information at all times. The sections that follow describe how Netscape helps you control cookies, passwords, forms, and images while you are surfing the Internet.
<p>Many web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. For information on how to take advantage of this emerging privacy standard, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
<p>For information about related Netscape security features, see <a href="mail_sec_help.html">Signing &amp; Encrypting Messages</a> and <a href="using_certs_help.html">Using Certificates</a>.
<p>For general information about prifvacy and security, including descriptions of viruses, safe online shopping and banking, and safe surfing for children, see the online document
<p>For general information about privacy and security, including descriptions of viruses, safe online shopping and banking, and safe surfing for children, see the online document
<a href="http://home.netscape.com/security/basics/index.html?cp=sciln" target="_blank">Understanding Security</a>.</p>
@ -164,7 +165,8 @@ for potential dog owners who do not have valid dog licenses.
<p>Web sites can use cookie information to tailor their presentations to you, and advertisers can use such information to target online ads to your interests and buying information. Reputable web sites have privacy policies that describe how they use the information they receive.
<p>When in doubt, always check a web site's privacy policy before permitting a cookie to be set, and before providing any personal information (such as your name and email address).</p>
<p>When in doubt, check a web site's privacy policy before permitting a cookie to be set and before providing any personal information (such as your name and email address). To learn how to do this, see <a href="using_priv_help.html#form_forms">Viewing Privacy Policies</a>. For information on how to manage cookies with the aid of published privacy policies, see <a href="using_priv_help.html#privacy_levels">Setting Privacy Levels</a>.
</p>
<a name="privacy_foreign"></a>
<a NAME="cookies:foreignIDX"></a>
@ -245,7 +247,7 @@ search engine to find them---try search words such as &quot;anonymous browsing&q
<hr>
<p><i>8 May 2002</i></p>
<p><i>9 May 2002</i></p>
<hr>
<p>Copyright &copy; 1998-2002 Netscape Communications Corporation.</p>

Просмотреть файл

@ -1,157 +1,42 @@
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>SSL Page Info Help</title>
<title>Help Writers</title>
<link rel="stylesheet" href="chrome://help/locale/content_style.css" type="text/css">
</head>
<body bgcolor="white">
<a name="jatin_billimoriaSDX"></a>
<a name="cotterSDX"></a>
<a name="robin_foster-clarkSDX"></a>
<a name="john_gorhamSDX"></a>
<a name="oeschgerSDX"></a>
<a name="steve_rudmanSDX"></a>
<a name="writersSDX"></a>
<a name="insructional_designSDX"></a>
<hr><h1>Netscape 7.0 Help Writers</h1>
<a NAME="cert_dialog_help_first"></a>
<h1>SSL Page Info</h1>
<p>The following members of the Netscape Instructional Design Group created the built-in Help system and content for Netscape 7.0:
<p>When you choose Page Info from the View menu and click the Security tab, you see information about authentication and encryption for the web page you are viewing.
<p><b>Jatin Billimoria:</b> Browsing the Web, Customizing Netscape, Netscape Keyboard Shortcuts.
<p>This section provides additional information about each combination you may encounter.</P>
<p><b>Sean Cotter:</b> Using the Help Window, Signing &amp; Encrypting Messages, Using Privacy Features, Using Certificates, Managing Profiles; lead writer.
<table cellpadding=4 cellspacing=2 bgcolor="#cccccc" Width=380>
<tr>
<td class="inthissection">
<p>In this section:</p>
<p><a href="#Not_Verified_Not Encrypted">Web Site Identity Not Verified&mdash;Connection Not Encrypted</a></p>
<p><a href="#Verified_Encrypted">Web Site Identity Verified&mdash;Connection Encrypted</a></p>
<p><a href="#Conditionally_Verified_Encrypted">Web Site Identity Conditionally Verified&mdash;Connection Encrypted</a></p>
<p><a href="#Verified_Not Encrypted">Web Site Identity Verified&mdash;Connection Not Encrypted
</a></p>
<p><a href="#Conditionally_Verified_Not_Encrypted">Web Site Identity Conditionally Verified&mdash;Connection Not Encrypted</a></p></td>
</tr>
</table>
<p><b>Robin Foster-Clark:</b> Using Netscape Mail, Creating Web Pages.
<p><b>John Gorham:</b> Using AOL Instant Messenger for Netscape, Using ICQ for Netscape, Introduction to Netscape 7.0 (the book).
<p><b>Ian Oeschger:</b> Help system design and implementation.
<p>&nbsp;</p>
<a NAME="Not_Verified_Not Encrypted"></a>
<h2>Web Site Identity Not Verified&mdash;<br>Connection Not Encrypted</h2>
<p><b>Steve Rudman:</b> Manager.
<p>
<p>Thanks to Jennifer Moore for Help usability testing, Laura Krietemeyer for administrative support, and the entire Netscape team.
<ul>
<LI><B>Web Site Identity Not Verified.</B> The web site you are viewing does not support certificate-based authentication. Therefore, Certificate Manager cannot verify its identity. It is possible, though unlikely, that the web site is not what it claims to be.</LI>
<LI><B>Connection Not Encrypted.</B> It is possible, though unlikely, that other people can view information sent from your computer to the web site or information sent by the web site to your computer. This should be of concern only if you are sending or viewing confidential information, such as your credit card number.</LI>
</ul>
<p>For short definitions, click <a href="glossary.html#authentication">authentication</a>, <a href="glossary.html#encryption">encryption</a>, or <a href="glossary.html#certificate">certificate</a>.</P>
<p>&nbsp;</p>
<a NAME="Verified_Encrypted"></a>
<h2>Web Site Identity Verified&mdash;<br>Connection Encrypted</h2>
<p>
<ul>
<LI><B>Web Site Identity Verified.</B> The certificate that Certificate Manager has used to verify this web site's identity was issued by a certificate authority (CA) marked as one that you trust. You can be reasonably confident that the web site is what it claims to be.</LI>
<LI><B>Connection Encrypted.</B> In general, the strength of an encrypted connection depends on the length of the keys use for encryption, measured in bits. The longer the key, the stronger the encryption&mdash;that is, the harder it is to for an unauthorized person to unscramble the encrypted information.</LI>
<p>The Page Info window describes encryption strength in one of three ways:</P>
<ul>
<LI><B>High-grade encryption.</B> Strongest encryption available, using 128-bit keys at a minimum.</LI>
<LI><B>Medium-grade encryption.</B> Somewhat stronger than low-grade encryption, using 56- or 64-bit keys.</LI>
<LI><B>Low-grade encryption.</B> Weakest encryption available, using 40-bit keys.</LI>
</ul>
</ul>
<p>For short definitions, click <a href="glossary.html#authentication">authentication</a>, <a href="glossary.html#encryption">encryption</a>, or <a href="glossary.html#certificate">certificate</a>.</P>
<p>&nbsp;</p>
<a NAME="Conditionally_Verified_Encrypted"></a>
<h2>Web Site Identity Conditionally Verified&mdash;<br>Connection Encrypted</h2>
<p>
<ul>
<LI><B>Web Site Identity Conditionally Verified. </B>The web site you are viewing has presented a certificate that is invalid, but that you have decided to accept anyway. </LI>
<p>The Page Info window has listed one or both of the following reasons
why the web site's certificate is invalid:
</P>
<ul>
<LI>The identity of this web site has been verified by a certificate authority that you have not designated as trusted for this purpose. If you wish to trust this certificate authority to identify web sites in the future, click the Edit button and select &quot;This certificate can certify web sites that support encryption.&quot;</LI>
<LI>The certificate used to identify the web site belongs to a web site with a URL that's different from the URL specified in the certificate. If Personal Security Manager informs you of this discrepancy, you should be cautious about using the web site, since it appears to be misrepresenting itself. </LI>
</ul>
<LI><B>Connection Encrypted. </B>In general, the strength of an encrypted connection depends on the length of the keys use for encryption, measured in bits. The longer the key, the stronger the encryption&mdash;that is, the harder it is to for an unauthorized person to unscramble the encrypted information.</LI>
</ul>
<p>The Page Info window describes encryption strength in one of three ways:
</P>
<ul>
<LI><B>High-grade encryption.</B> Strongest encryption available, using 128-bit keys at a minimum.</LI>
<LI><B>Medium-grade encryption.</B> Somewhat stronger than low-grade encryption, using 56- or 64-bit keys.</LI>
<LI><B>Low-grade encryption.</B> Weakest encryption available, using 40-bit keys.</LI>
</ul>
<p>For short definitions, click <a href="glossary.html#authentication">authentication</a>, <a href="glossary.html#encryption">encryption</a>, or <a href="glossary.html#certificate">certificate</a>.</P>
<p>&nbsp;</p>
<a NAME="Verified_Not Encrypted"></a>
<h2>Web Site Identity Verified&mdash;<br>Connection Not Encrypted</h2>
<p>
<ul>
<LI><B>Web Site Identity Verified.</B> The certificate that Personal Security Manager has used to verify this web site's identity was issued by a certificate authority (CA) designated in your <a href="glossary.htm#1023462">certificate store</a> as one that is trusted for the purpose of identifying web sites. You can be reasonably confident that the web site is what it claims to be.</LI>
<LI><B>Connection Not Encrypted.</B> It is possible, though unlikely, that other people can view information sent from your computer to the web site or information sent by the web site to your computer. This should be of concern only if you are sending or viewing confidential information, such as your credit card number.</LI>
</ul>
<p>For short definitions, click <a href="glossary.html#authentication">authentication</a>, <a href="glossary.html#encryption">encryption</a>, or <a href="glossary.html#certificate">certificate</a>.</P>
<p>&nbsp;</p>
<a NAME="Conditionally_Verified_Not_Encrypted"></a>
<h2>Web Site Conditionally Verified&mdash;<br>Connection Not Encrypted</h2>
<p>
<ul>
<LI><B>Web Site Identity Conditionally Verified. </B>The web site you are viewing has presented a certificate that is invalid, but that you have decided to accept anyway. To view the certificate, click the View button. </LI>
<p>The Page Info window may list one or both of the following reasons
why the web site's certificate is invalid:
<ul>
<LI>The identity of this web site has been verified by a certificate authority that you have not designated as trusted for this purpose. If you wish to trust this certificate authority to identify web sites in the future, click the Edit button and select the check box labeled &quot;This certificate can certify web sites that support encryption.&quot;</LI><P>
<LI>The certificate used to identify the web site belongs to a web site with a URL that's different from the URL specified in the certificate. If the Page Info window informs you of this discrepancy, you should be cautious about using the web site, since it appears to be misrepresenting itself. </LI>
</ul>
<LI><B>Connection Not Encrypted.</B> It is possible, though unlikely, that other people can view information sent from your computer to the web site or information sent by the web site to your computer. This should be of concern only if you are sending or viewing confidential information, such as your credit card number.</LI>
</ul>
<p>For short definitions, click <a href="glossary.html#authentication">authentication</a>, <a href="glossary.html#encryption">encryption</a>, or <a href="glossary.html#certificate">certificate</a>.</P>
<hr>
<p><i>8/28/2001</i></p>
<p>Copyright &copy; 1998-2001 The Mozilla Organization.</p>
<p><hr>
<p><i>9 May 2002</i></p>
<p>Copyright &copy; 1998-2001 Netscape Communications Corporation.</p>
</body>
</html>

Просмотреть файл

@ -81,7 +81,7 @@
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-insecure.gif">&nbsp;</td><td>An open lock means the page was not protected by encryption when it was received. </td></tr>
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the frames within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the elements within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
</table>
<p>For more details about the encryption status of the page when it was received, click the lock icon (or open the View menu, choose Page Info, and click the Security tab).
@ -502,7 +502,7 @@
<hr>
<p><i>8 May 2002</i></p>
<p><i>9 May 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -81,7 +81,7 @@
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-insecure.gif">&nbsp;</td><td>An open lock means the page was not protected by encryption when it was received. </td></tr>
<tr><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the frames within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
<tr><td>&nbsp;</td><td><img src="chrome://communicator/skin/icons/lock-broken.gif">&nbsp;</td><td>A broken lock means that some or all of the elements within the page were not protected by encryption when the page was received, even though the outermost HTML page was encrypted.</td></tr>
</table>
<p>For more details about the encryption status of the page when it was received, click the lock icon (or open the View menu, choose Page Info, and click the Security tab).
@ -502,7 +502,7 @@
<hr>
<p><i>8 May 2002</i></p>
<p><i>9 May 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -124,10 +124,11 @@ Using the Cookie Manager</h1>
<a NAME="protecting_your_privacySDX"></a>
<a NAME="privacy:P3P_levelsIDX"></a>
<a NAME="setting_P3P_levelsSDX"></a>
<a NAME="controlling_your_privacySDX"></a>
<a NAME="privacy_levels"></a>
<h2>Setting Privacy Levels</h2>
<p>Many web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. A web site's privacy policy describes what kind of information the site collects, to whom it gives that information, and how it uses the information. For information about viewing a web site's privacy policy, see <a href="#form_forms">Controlling Your Privacy</a>.
<p>Many web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. A web site's privacy policy describes what kind of information the site collects, to whom it gives that information, and how it uses the information. For information about viewing a web site's privacy policy, see <a href="#form_forms">Viewing Privacy Policies</a>.
<p>You can choose to enable cookies based on web site's published privacy policies, the browser's privacy settings, and the P3P standard. When cookies are enabled in this manner, the browser checks your current privacy settings against the web site's published privacy policy (if present) and takes appropriate action.
@ -533,7 +534,7 @@ Using the Cookie Manager</h1>
<p><a href="#form_data_view_edit">Managing Stored Form Data</a></p>
<p><a href="#form_sites_view_edit">Editing Stored Site Information</a></p>
<p><a href="#form_forms">Controlling Your Privacy</a></p>
<p><a href="#form_forms">Viewing Privacy Policies</a></p>
<p><a href="#form_settings">Form Settings</a></p>
</td>
</tr>
@ -677,8 +678,7 @@ Using the Cookie Manager</h1>
<p>&nbsp;</p>
<a NAME="form_forms"></a>
<h2>Controlling Your Privacy</h2>
<a NAME="form_forms"></a><h2>Viewing Privacy Policies</h2>
<p>If you provide personal information such as your name, phone number, or email address to a web site, it is free to store that information and use it later. A web site might use your information to improve its service to you or target advertising to your interests. Or it could sell your information to other companies.
@ -688,7 +688,7 @@ Using the Cookie Manager</h1>
<p>A web site's privacy policy describes what kind of information the site collects, to whom it gives that information, and how it uses the information. Web sites publish privacy policies in both human-readable form and as an XML file that can be interpreted by the browser according to your <a href="#privacy_levels_window">Privacy Settings</a>.
<p>To check a web site's privacy policy, browse to the site and follow these steps:
<p>To view a web site's privacy policy, browse to the site and follow these steps:
<ul>
<li>Open the View menu and choose Page info.
@ -1035,7 +1035,7 @@ site&quot; in response to the Form Manager's request to store form data.
<hr>
<p><i>8 May 2002</i></p>
<p><i>9 May 2002</i></p>
<hr>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>

Просмотреть файл

@ -124,10 +124,11 @@ Using the Cookie Manager</h1>
<a NAME="protecting_your_privacySDX"></a>
<a NAME="privacy:P3P_levelsIDX"></a>
<a NAME="setting_P3P_levelsSDX"></a>
<a NAME="controlling_your_privacySDX"></a>
<a NAME="privacy_levels"></a>
<h2>Setting Privacy Levels</h2>
<p>Many web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. A web site's privacy policy describes what kind of information the site collects, to whom it gives that information, and how it uses the information. For information about viewing a web site's privacy policy, see <a href="#form_forms">Controlling Your Privacy</a>.
<p>Many web sites publish their privacy policies according to the Platform for Privacy Preferences (P3P) standard. A web site's privacy policy describes what kind of information the site collects, to whom it gives that information, and how it uses the information. For information about viewing a web site's privacy policy, see <a href="#form_forms">Viewing Privacy Policies</a>.
<p>You can choose to enable cookies based on web site's published privacy policies, the browser's privacy settings, and the P3P standard. When cookies are enabled in this manner, the browser checks your current privacy settings against the web site's published privacy policy (if present) and takes appropriate action.
@ -533,7 +534,7 @@ Using the Cookie Manager</h1>
<p><a href="#form_data_view_edit">Managing Stored Form Data</a></p>
<p><a href="#form_sites_view_edit">Editing Stored Site Information</a></p>
<p><a href="#form_forms">Controlling Your Privacy</a></p>
<p><a href="#form_forms">Viewing Privacy Policies</a></p>
<p><a href="#form_settings">Form Settings</a></p>
</td>
</tr>
@ -677,8 +678,7 @@ Using the Cookie Manager</h1>
<p>&nbsp;</p>
<a NAME="form_forms"></a>
<h2>Controlling Your Privacy</h2>
<a NAME="form_forms"></a><h2>Viewing Privacy Policies</h2>
<p>If you provide personal information such as your name, phone number, or email address to a web site, it is free to store that information and use it later. A web site might use your information to improve its service to you or target advertising to your interests. Or it could sell your information to other companies.
@ -688,7 +688,7 @@ Using the Cookie Manager</h1>
<p>A web site's privacy policy describes what kind of information the site collects, to whom it gives that information, and how it uses the information. Web sites publish privacy policies in both human-readable form and as an XML file that can be interpreted by the browser according to your <a href="#privacy_levels_window">Privacy Settings</a>.
<p>To check a web site's privacy policy, browse to the site and follow these steps:
<p>To view a web site's privacy policy, browse to the site and follow these steps:
<ul>
<li>Open the View menu and choose Page info.
@ -1035,7 +1035,7 @@ site&quot; in response to the Form Manager's request to store form data.
<hr>
<p><i>8 May 2002</i></p>
<p><i>9 May 2002</i></p>
<hr>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>

Просмотреть файл

@ -155,7 +155,7 @@
<p>This dialog box displays the following options and information:
<ul>
<li><b>Enable Automatic Update for this CRL:</b> Select this option if you want the CRL you selected to be updated automatically according to the schedule you set here.
<li><b>Enable Automatic Update for this CRL:</b> Select this option if you want the CRL you selected to be updated automatically according to the schedule you set here. (Note that you can't select this option if the CRL doesn't specify a Next Update date.)
<p>If you enable Automatic Update, you must select one of these radio buttons:
<ul>
<li><b>Update X days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
@ -176,7 +176,7 @@
<hr>
<p><i>2 May 2002</i></p>
<p><i>9 May 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>

Просмотреть файл

@ -155,7 +155,7 @@
<p>This dialog box displays the following options and information:
<ul>
<li><b>Enable Automatic Update for this CRL:</b> Select this option if you want the CRL you selected to be updated automatically according to the schedule you set here.
<li><b>Enable Automatic Update for this CRL:</b> Select this option if you want the CRL you selected to be updated automatically according to the schedule you set here. (Note that you can't select this option if the CRL doesn't specify a Next Update date.)
<p>If you enable Automatic Update, you must select one of these radio buttons:
<ul>
<li><b>Update X days before Next Update date.</b> Select this option if you want to base the update frequency on the frequency with which the CRL publisher publishes a new version of the CRL.
@ -176,7 +176,7 @@
<hr>
<p><i>2 May 2002</i></p>
<p><i>9 May 2002</i></p>
<p>Copyright &copy; 1994-2002 Netscape Communications Corporation.</p>
</body>