You can help by adding to it. January Main article: Internet Explorer 11 Internet Explorer 11 is featured in a Windows 8. It includes an incomplete mechanism for syncing tabs. It also announces compatibility with Gecko the layout engine of Firefox.
Internet Explorer is still installed in Windows 10 in order to maintain compatibility with older websites and intranet sites that require ActiveX and other Microsoft legacy web technologies. However, it will continue to be maintained as part of the support policy for the versions of Windows with which it is included. During the heyday of the browser wars , Internet Explorer superseded Netscape only when it caught up technologically to support the progressive features of the time.
Fully supports XSLT 1. Support for XSLT 2. Almost full conformance to CSS 2. This has resulted in a number of web pages that appear broken in standards-compliant web browsers and has introduced the need for a " quirks mode " to allow for rendering improper elements meant for Internet Explorer in these other browsers.
Internet Explorer has introduced a number of extensions to the DOM that have been adopted by other browsers. Microsoft submitted several other features of IE for consideration by the W3C for standardization. Pop-up blocking and tabbed browsing were added respectively in Internet Explorer 6 and Internet Explorer 7. Temporary Internet Files and Index. The content is indexed in a database file, known as Index.
In IE7 and later, when the cache is cleared, the cache files are more reliably removed, and the index. Caching has been improved in IE9. Administrators of Windows Server domains for domain-joined computers or the local computer can apply and enforce a variety of settings on computers that affect the user interface such as disabling menu items and individual configuration options , as well as underlying security features such as downloading of files, zone configuration, per-site settings, ActiveX control behaviour and others.
Policy settings can be configured for each user and for each machine. Internet Explorer also supports Integrated Windows Authentication. Architecture[ edit ] The architecture of IE8.
Previous versions had a similar architecture, except that both tabs and the UI were within the same process. Consequently, each browser window could have only one "tab process". It consists of several major components, each of which is contained in a separate Dynamic-link library DLL and exposes a set of COM programming interfaces hosted by the Internet Explorer main executable, iexplore.
It handles all network communication over these protocols. The DOM tree is further processed by a layout engine which then renders the internal representation on screen. Internet Explorer 8 includes the bindings for the Active Scripting engine, which is a part of Microsoft Windows and allows any language implemented as an Active Scripting module to be used for client-side scripting.
LCIE separates the main window process frame process from the processes hosting the different web applications in different tabs tab processes. A frame process can create multiple tab processes, each of which can be of a different integrity level ; each tab process can host multiple web sites.
The processes use asynchronous Inter-Process Communication to synchronize themselves. Generally, there will be a single frame process for all web sites. In Windows Vista with Protected Mode turned on, however, opening privileged content such as local HTML pages will create a new tab process as it will not be constrained by Protected Mode.
Browser extensibility and content extensibility. BHOs are used to extend the feature set of the browser, whereas the other extensibility options are used to expose that feature in the user interface. Content extensibility adds support for non-native content formats.
Since malicious add-ons can compromise the security of a system, Internet Explorer implements several safeguards. Internet Explorer 6 with Service Pack 2 and later feature an Add-on Manager for enabling or disabling individual add-ons, complemented by a "No Add-Ons" mode.
Starting with Windows Vista , Internet Explorer and its BHOs run with restricted privileges and are isolated from the rest of the system. Add-on Performance Advisor shows a notification when one or more of installed add-ons exceed a pre-set performance threshold.
The notification appears in the Notification Bar when the user launches the browser. Windows 8 and Windows RT introduce a Metro-style version of Internet Explorer that is entirely sandboxed and does not run add-ons at all. This can be used to embed the browser functionality inside a computer program or create Internet Explorer shells.
Browser security Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions. Internet Explorer 6 SP2 onwards uses the Attachment Execution Service of Microsoft Windows to mark executable files downloaded from the Internet as being potentially unsafe.
Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing accidental installation of malware. Internet Explorer 7 introduced the phishing filter, that restricts access to phishing sites unless the user overrides the decision.
With version 8, it also blocks access to sites known to host malware. Downloads are also checked to see if they are known to be malware-infected.
In Windows Vista , Internet Explorer by default runs in what is called Protected Mode, where the privileges of the browser itself are severely restricted—it cannot make any system-wide changes.
One can optionally turn this mode off but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited.
Patches and updates to the browser are released periodically and made available through the Windows Update service, as well as through Automatic Updates. Although security patches continue to be released for a range of platforms, most feature additions and security infrastructure improvements are only made available on operating systems which are in Microsoft's mainstream support phase.
On December 16, , Trend Micro recommended users switch to rival browsers until an emergency patch was released to fix a potential security risk which "could allow outside users to take control of a person's computer and steal their passwords".
Microsoft representatives countered this recommendation, claiming that "0. This is known as a " drive-by install ". There are also attempts to trick the user into installing malicious software by misrepresenting the software's true purpose in the description section of an ActiveX security alert.
A number of security flaws affecting IE originated not in the browser itself, but ActiveX -based add-ons used by it. Because the add-ons have the same privilege as IE, the flaws can be as critical as browser flaws. This has led to the ActiveX-based architecture being criticized for being fault-prone. By , some experts maintained that the dangers of ActiveX have been overstated and there were safeguards in place. Internet Explorer in , had a number of published security vulnerabilities.
According to research done by security research firm Secunia , Microsoft did not respond as quickly as its competitors in fixing security holes and making patches available. According to an October report in The Register , researcher Chris Evans had detected a known security vulnerability which, then dating back to , had not been fixed for at least days.