Current location - Quotes Website - Personality signature - Specific description of Acticex control
Specific description of Acticex control
Principle of ActiveX technology

The network real-name plug-in is installed by Microsoft ActiveX technology. After clicking "Details" in the pop-up window, Microsoft has told users what they should know (including the publisher, validity period and owner of the digital certificate, etc. ) and decide whether to install the plug-in according to whether the user clicks "Yes" or "No". The pop-up window when the network real-name plug-in is installed is the installation interface of ActiveX standard, which is controlled by Windows. You can only click on the link above to view the detailed introduction and license agreement of the software.

1.

What is an ActiveX control?

2.

How to install ActiveX controls?

3.

Which vendors and software use ActiveX technology?

4.

How does the browser ensure the security of ActiveX controls?

What is an ActiveX control?

According to the definition of Microsoft authoritative software development guide MSDN(Microsoft Developer Network), ActiveX controls (or ActiveX plug-ins) used to be called OLE controls or OCX controls. They are software components or objects that can be inserted into web pages or other applications.

How to install ActiveX controls?

On the Internet, the characteristics of ActiveX control software are: general software needs to be downloaded separately by users before installation, while ActiveX controls can be automatically downloaded and prompted for installation by IE browser when users browse to specific web pages. The prerequisite for installing ActiveX plug-ins is that they must be approved and confirmed by users.

Which vendors and software use ActiveX technology?

ActiveX plug-in technology is a common software technology based on Windows platform in the world. In addition to the network real-name plug-in, many softwares are developed in this way, such as Flash animation player plug-in, Microsoft MediaPlayer plug-in, and CNNIC universal website plug-in.

Return to the peak

How does the browser ensure the security of ActiveX plug-ins?

When distributing software through the Internet, the security of software is a very noticeable problem. IE browser ensures the security of ActiveX plug-ins in the following ways:

ActiveX uses two complementary strategies: security level and authentication to pursue further software security;

* Microsoft provides a set of tools that can be used to increase the security of ActiveX objects;

* Through Microsoft's verification code tool, you can sign the ActiveX control, which tells users that you are indeed the author of the control, and no one else has tampered with it;

* In order to use the verification code tool to sign components, you must obtain a digital certificate from a certificate authority; A certificate contains information indicating that a specific software program is genuine, which ensures that other programs can no longer use the logo of the original program. The certificate also records the date of issue. When you try to download the software, Internet Explorer verifies the information in the certificate and whether the current date is earlier than the expiration date of the certificate. If the information is not up-to-date and valid at the time of downloading, Internet Explorer will display a warning;

* Under the default security level of IE, before installing ActiveX controls, users can choose whether to continue to install and run the software according to their trust in the software publisher and the software itself.

* The network real-name plug-in is signed by a digital certificate issued by Verisign, an international authoritative security manufacturer, so the authenticity and security of the network real-name plug-in can be guaranteed.