Summary

We learned that Internet Explorer has suffered from numerous security holes. Risks can be minimized by applying the appropriate security settings, keeping software updated, and avoiding malicious web sites. So far we’ve discussed what HTML and scripting languages can do. The following two chapters cover Java and ActiveX technologies.

Get Malicious Mobile Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.