9.7 Summary We learned that Internet Explorer has suffered from numerous security holes. Risks can be minimized by applying the appropriate security settings, keeping software updated, and avoiding malicious web sites. So far we've discussed what HTML and scripting languages can do. The following two chapters cover Java and ActiveX technologies. |
Team-Fly |
Top |