Template:Merge from Template:Infobox web browser Template:Countries by most used web browser Internet Explorer[lower-alpha 1] (formerly Microsoft Internet Explorer[lower-alpha 2] and Windows Internet Explorer[lower-alpha 3], commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems, starting in 1995. It was first released as part of the add-on package Plus! for Windows 95 that year. Later versions were available as free downloads, or in service packs, and included in the Original Equipment Manufacturer (OEM) service releases of Windows 95 and later versions of Windows.
Internet Explorer is one of the most widely used web browsers, attaining a peak of about 95% usage share during 2002 and 2003. Its usage share has since declined with the launch of Firefox (2004) and Google Chrome (2008), and with the growing popularity of operating systems such as OS X, Linux, iOS and Android that do not run Internet Explorer. Estimates for Internet Explorer's overall market share range from 27.4% to 54.13%, as of October 2012[update] (browser market share is notoriously difficult to calculate). Microsoft spent over Template:USD per year on Internet Explorer in the late 1990s, with over 1000 people working on it by 1999.
Since its first release, Microsoft has added features and technologies such as basic table display (in version 1.5); XMLHttpRequest (in version 5), which aids creation of dynamic web pages; and Internationalized Domain Names (in version 7), which allow Web sites to have native-language addresses with non-Latin characters. The browser has also received scrutiny throughout its development for use of third-party technology (such as the source code of Spyglass Mosaic, used without royalty in early versions) and security and privacy vulnerabilities, and both the United States and the European Union have alleged that integration of Internet Explorer with Windows has been to the detriment of other browsers.
Versions of Internet Explorer for other operating systems have also been produced, including an Xbox 360 version called Internet Explorer for Xbox and an embedded OEM version called Pocket Internet Explorer, later rebranded Internet Explorer Mobile, which is based on Internet Explorer 9 and made for Windows Phone, Windows CE, and previously, based on Internet Explorer 7 for Windows Mobile. It remains in development alongside the desktop versions. Internet Explorer for Mac and Internet Explorer for UNIX (Solaris and HP-UX) have been discontinued.
From January 12, 2016, only the most recent version of Internet Explorer on each operating system will be supported, depending on operating system it will be IE 11 or could be down to IE 9 for older desktop/server Windows versions or down to IE 7 for older embedded Windows versions.
On January 21 2015, Microsoft announced an Internet Explorer successor, codenamed Spartan, being in development.
The Internet Explorer project was started in the summer of 1994 by Thomas Reardon,Template:Cn who, according the Massachusetts Institute of Technology Review of 2003, used source code from Spyglass, Inc. Mosaic, which was an early commercial web browser with formal ties to the pioneering National Center for Supercomputing Applications (NCSA) Mosaic browser. In late 1994, Microsoft licensed Spyglass Mosaic for a quarterly fee plus a percentage of Microsoft's non-Windows revenues for the software. Although bearing a name similar to NCSA Mosaic, Spyglass Mosaic had used the NCSA Mosaic source code sparingly. Microsoft was sued by Synet Inc. in 1996 over the trademark infringement.
The first version of Internet Explorer, Microsoft Internet Explorer (later referred to as Internet Explorer 1) made its debut on August 16, 1995. It was a reworked version of Spyglass Mosaic, which Microsoft licensed from Spyglass Inc., like many other companies initiating browser development. It came with Microsoft Plus! for Windows 95 and the OEM release of Windows 95,Script error and was installed as part of the Internet Jumpstart Kit in Plus!. The Internet Explorer team began with about six people in early development. Internet Explorer 1.5 was released several months later for Windows NT and added support for basic table rendering. By including it free of charge on their operating system, they did not have to pay royalties to Spyglass Inc, resulting in a lawsuit and a US$8 million settlement on January 22, 1997.
Windows Internet Explorer 8
Windows Internet Explorer 9
Internet Explorer was to be omitted from Windows 7 and Windows Server 2008 R2 in Europe, but Microsoft ultimately included it, with a browser option screen allowing users to select any of several web browsers (including Internet Explorer).
Internet Explorer 10
Template:Main Internet Explorer 10 became generally available on October 26, 2012 alongside Windows 8 and Windows Server 2012. It became available for Windows 7 on February 26, 2013. Microsoft announced Internet Explorer 10 in April 2011 at MIX 11 in Las Vegas, releasing the first Platform Preview at the same time. At the show, it was said that Internet Explorer 10 was about 3 weeks in development. This release further improves upon standards support, including HTML5 Drag & Drop and CSS3 gradients. Internet Explorer 10 drops support for Windows Vista and will only run on Windows 7 Service Pack 1 and later. Internet Explorer 10 Release Preview was also released on the Windows 8 Release Preview platform.
Internet Explorer 11
Template:Main Internet Explorer 11 is featured in a Windows 8.1 update which was released on October 17, 2013. It includes an incomplete mechanism for syncing tabs. It is a major update to its developer tools, enhanced scaling for high DPI screens, HTML5 prerender and prefetch, hardware-accelerated JPEG decoding, closed captioning, HTML5 full screen, and is the first Internet Explorer to support WebGL and Google's protocol SPDY (starting at v3).
Internet Explorer 11's user agent string now identifies the agent as "Trident" (the underlying layout engine) instead of "MSIE". It also announces compatibility with Gecko (the layout engine of Firefox).
Internet Explorer has been designed to view a broad range of web pages and provide certain features within the operating system, including Microsoft Update. During the heyday of the browser wars, Internet Explorer superseded Netscape only when it caught up technologically to support the progressive features of the time.Template:Better source
- Supports HTML 4.01, HTML 5, CSS Level 1, Level 2 and Level 3, XML 1.0, and DOM Level 1, with minor implementation gaps.
- Fully supports XSLT 1.0 as well as an obsolete Microsoft dialect of XSLT often referred to as WD-xsl, which was loosely based on the December 1998 W3C Working Draft of XSL. Support for XSLT 2.0 lies in the future: semi-official Microsoft bloggers have indicated that development is underway, but no dates have been announced.
- Almost full conformance to CSS 2.1 has been added in the Internet Explorer 8 release. The trident rendering engine in Internet Explorer 9 in 2011 scored highest in the official W3C conformance test suite for CSS 2.1 of all major browsers.
- Supports XHTML in Internet Explorer 9 (Trident version 5.0). Prior versions can render XHTML documents authored with HTML compatibility principles and served with a
- Supports a subset of SVG in Internet Explorer 9 (Trident version 5.0), excluding SMIL, SVG fonts and filters.
Internet Explorer uses DOCTYPE sniffing to choose between standards mode and a "quirks mode" in which it deliberately mimicks nonstandard behaviours of old versions of MSIE for HTML and CSS rendering on screen (Internet Explorer always uses standards mode for printing). It also provides its own dialect of ECMAScript called JScript.
Internet Explorer has introduced an array of proprietary extensions to many of the standards, including HTML, CSS, and the DOM. This has resulted in a number of web pages that appear broken in standards-compliant web browsers and has introduced the need for a "quirks mode" to allow for rendering improper elements meant for Internet Explorer in these other browsers.
Internet Explorer has introduced a number of extensions to the DOM that have been adopted by other browsers. These include the innerHTML property, which provides access to the HTML string within an elementScript error ; the XMLHttpRequest object, which allows the sending of HTTP request and receiving of HTTP response, and may be used to perform AJAX; and the designMode attribute of the contentDocument object, which enables rich text editing of HTML documentsScript error . Some of these functionalities were not possible until the introduction of the W3C DOM methods. Its Ruby character extension to HTML is also accepted as a module in W3C XHTML 1.1, though it is not found in all versions of W3C HTML.
Microsoft submitted several other features of IE for consideration by the W3C for standardization. These include the 'behaviour' CSS property, which connects the HTML elements with JScript behaviours (known as HTML Components, HTC); HTML+TIME profile, which adds timing and media synchronization support to HTML documents (similar to the W3C XHTML+SMIL), and the VML vector graphics file format. However, all were rejected, at least in their original forms; VML was subsequently combined with PGML (proposed by Adobe and Sun), resulting in the W3C-approved SVG format, one of the few vector image formats being used on the web, which IE did not support until version 9.
Other non-standard behaviours include: support for vertical text, but in a syntax different from W3C CSS3 candidate recommendation, support for a variety of image effects and page transitions, which are not found in W3C CSS, support for obfuscated script code, in particular JScript.Encode. Support for embedding EOT fonts in web pages.
Support for favicons was first added in Internet Explorer 5. Internet Explorer supports favicons in PNG, static GIF and native Windows icon formats. In Windows Vista and later, Internet Explorer can display native Windows icons that have embedded PNG files.
Usability and accessibility
Internet Explorer makes use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to that of Windows Explorer. Pop-up blocking and tabbed browsing were added respectively in Internet Explorer 6 and Internet Explorer 7. Tabbed browsing can also be added to older versions by installing MSN Search Toolbar or Yahoo Toolbar.
Internet Explorer caches visited content in the Temporary Internet Files folder to allow quicker access (or offline access) to previously visited pages. The content is indexed in a database file, known as Index.dat. Multiple Index.dat files exist which index different content—visited content, web feeds, visited URLs, cookies, etc.
Prior to IE7, clearing the cache used to clear the index but the files themselves were not reliably removed, posing a potential security and privacy risk. In IE7 and later, when the cache is cleared, the cache files are more reliably removed, and the index.dat file is overwritten with null bytes.
Caching has been improved in IE9.
Template:Main Internet Explorer is fully configurable using Group Policy. Administrators of Windows Server domains (for domain-joined computers) or the local computer can apply and enforce a variety of settings on computers that affect the user interface (such as disabling menu items and individual configuration options), as well as underlying security features such as downloading of files, zone configuration, per-site settings, ActiveX control behaviour and others. Policy settings can be configured for each user and for each machine. Internet Explorer also supports Integrated Windows Authentication.
Internet Explorer uses a componentized architecture built on the Component Object Model (COM) technology. It consists of several major components, each of which is contained in a separate Dynamic-link library (DLL) and exposes a set of COM programming interfaces hosted by the Internet Explorer main executable, iexplore.exe:
- WinInet.dll is the protocol handler for HTTP, HTTPS and FTP. It handles all network communication over these protocols.
- URLMon.dll is responsible for MIME-type handling and download of web content, and provides a thread-safe wrapper around WinInet.dll and other protocol implementations.
- MSHTML.dll houses the Trident rendering engine introduced in Internet Explorer 4, which is responsible for displaying the pages on-screen and handling the Document Object Model of the web pages. MSHTML.dll parses the HTML/CSS file and creates the internal DOM tree representation of it. It also exposes a set of APIs for runtime inspection and modification of the DOM tree. The DOM tree is further processed by a layout engine which then renders the internal representation on screen.
- IEFrame.dll contains the user interface and window of IE in Internet Explorer 7 and above.
- ShDocVw.dll provides the navigation, local caching and history functionalities for the browser.
- BrowseUI.dll is responsible for rendering the browser user interface such as menus and toolbars.
Internet Explorer does not include any native scripting functionality. Rather, MSHTML.dll exposes an API that permit a programmer to develop a scripting environment to be plugged-in and to access the DOM tree. Internet Explorer 8 includes the bindings for the Active Scripting engine, which is a part of Microsoft Windows and allows any language implemented as an Active Scripting module to be used for client-side scripting. By default, only the JScript and VBScript modules are provided; third party implementations like ScreamingMonkey (for ECMAScript 4 support) can also be used. Microsoft also makes available the Microsoft Silverlight runtime (not supported in Windows RT) that allows CLI languages, including DLR-based dynamic languages like IronPython and IronRuby, to be used for client-side scripting.
Internet Explorer 8 introduces some major architectural changes, called Loosely Coupled IE (LCIE). LCIE separates the main window process (frame process) from the processes hosting the different web applications in different tabs (tab processes). A frame process can create multiple tab processes, each of which can be of a different integrity level; each tab process can host multiple web sites. The processes use asynchronous Inter-Process Communication to synchronize themselves. Generally, there will be a single frame process for all web sites. In Windows Vista with Protected Mode turned on, however, opening privileged content (such as local HTML pages) will create a new tab process as it will not be constrained by Protected Mode.
Internet Explorer exposes a set of Component Object Model (COM) interfaces that allows add-ons to extend the functionality of the browser. Extensibility is divided into two types: Browser extensibility and content extensibility. Browser extensibility involves adding context menu entries, toolbars, menu items or Browser Helper Objects (BHO). BHOs are used to extend the feature set of the browser, whereas the other extensibility options are used to expose that feature in the user interface. Content extensibility adds support for non-native content formats. It allows Internet Explorer to handle new file formats and new protocols, e.g. WebM or SPDY. In addition, web pages can integrate widgets known as ActiveX controls which run on Windows only but have vast potentials to extend the content capabilities; Adobe Flash Player and Microsoft Silverlight are examples. Add-ons can be installed either locally, or directly by a web site.
Since malicious add-ons can compromise the security of a system, Internet Explorer implements several safeguards. Internet Explorer 6 with Service Pack 2 and later feature an Add-on Manager for enabling or disabling individual add-ons, complemented by a "No Add-Ons" mode. Starting with Windows Vista, Internet Explorer and its BHOs run with restricted privileges and are isolated from the rest of the system. Internet Explorer 9 introduced a new component — Add-on Performance Advisor. Add-on Performance Advisor shows a notification when one or more of installed add-ons exceed a pre-set performance threshold. The notification appears in the Notification Bar when the user launches the browser. Windows 8 and Windows RT introduce a Metro-style version of Internet Explorer that is entirely sandboxed and does not run add-ons at all. In addition, Windows RT cannot download or install ActiveX controls at all; although existing ones bundled with Windows RT still run in the traditional version of Internet Explorer.
Internet Explorer itself can be hosted by other applications via a set of COM interfaces. This can be used to embed the browser functionality inside a computer program or create Internet Explorer shells.
Template:See also Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions.
Internet Explorer 6 SP2 onwards uses the Attachment Execution Service of Microsoft Windows to mark executable files downloaded from the Internet as being potentially unsafe. Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing accidental installation of malware.
Internet Explorer 7 introduced the phishing filter, that restricts access to phishing sites unless the user overrides the decision. With version 8, it also blocks access to sites known to host malware. Downloads are also checked to see if they are known to be malware-infected.
In Windows Vista, Internet Explorer by default runs in what is called Protected Mode, where the privileges of the browser itself are severely restricted—it cannot make any system-wide changes. One can optionally turn this mode off but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited.
Patches and updates to the browser are released periodically and made available through the Windows Update service, as well as through Automatic Updates. Although security patches continue to be released for a range of platforms, most feature additions and security infrastructure improvements are only made available on operating systems which are in Microsoft's mainstream support phase.
On December 16, 2008, Trend Micro recommended users switch to rival browsers until an emergency IE patch was released to fix a potential security risk which "could allow outside users to take control of a person's computer and steal their passwords". Microsoft representatives countered this recommendation, claiming that "0.02% of internet sites" were affected by the flaw.
On December 17, 2008, a fix to the security problem above became available, with the release of the Security Update for Internet Explorer KB960714, which is available from Microsoft Windows Update's webpage. Microsoft has said that this update fixes the security risk found by Trend Micro the previous day.
Template:See also Internet Explorer has been subjected to many security vulnerabilities and concerns: Much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page in order to install themselves. This is known as a "drive-by install". There are also attempts to trick the user into installing malicious software by misrepresenting the software's true purpose in the description section of an ActiveX security alert.
A number of security flaws affecting IE originated not in the browser itself, but ActiveX-based add-ons used by it. Because the add-ons have the same privilege as IE, the flaws can be as critical as browser flaws. This has led to the ActiveX-based architecture being criticized for being fault-prone. By 2005, some experts maintained that the dangers of ActiveX have been overstated and there were safeguards in place. In 2006, new techniques using automated testing found more than a hundred vulnerabilities in standard Microsoft ActiveX components. Security features introduced in Internet Explorer 7 mitigated some of these vulnerabilities.
Internet Explorer in 2008 had a number of published security vulnerabilities. According to research done by security research firm Secunia, Microsoft did not respond as quickly as its competitors in fixing security holes and making patches available. The firm also reported 366 vulnerabilities in ActiveX controls, an increase from the prior year.
According to an October 2010 report in The Register, researcher Chris Evans had detected a known security vulnerability which, then dating back to 2008, had not been fixed for at least 600 days. Microsoft says that it had known about this vulnerability but it was of very low severity as the victim web site must be configured in a special way for this attack to be feasible at all.
In December 2010, researchers have been able to bypass the "Protected Mode" feature in Internet Explorer.
Vulnerability exploited in attacks on U.S. firms
Template:Main In an advisory on January 14, 2010, Microsoft said that attackers targeting Google and other U.S. companies used software that exploits a security hole, which had already been patched, in Internet Explorer. The vulnerability affected Internet Explorer 6 on Windows XP and Server 2003, IE6 SP1 on Windows 2000 SP4, IE7 on Windows Vista, XP, Server 2008 and Server 2003, and IE8 on Windows 7, Vista, XP, Server 2003, and Server 2008 (R2).
The German government warned users against using Internet Explorer and recommended switching to an alternative web browser, due to the major security hole described above that was exploited in Internet Explorer. The Australian and French Government issued a similar warning a few days later. The first browser they recommended was Mozilla Firefox, followed by Google Chrome.
Major vulnerability across versions
On April 26, 2014, Microsoft issued a security advisory relating to CVE-2014-1776, a vulnerability that could allow "remote code execution" in Internet Explorer versions 6 to 11. On April 28, 2014, the United States Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) released an advisory stating that the vulnerability could result in "the complete compromise" of an affected system. US-CERT recommended reviewing Microsoft's suggestions to mitigate an attack or using an alternate browser until the bug is fixed. The UK National Computer Emergency Response Team (CERT-UK) published an advisory announcing similar concerns and for users to take the additional step of ensuring their antivirus software is up-to-date. Symantec, a cyber security firm, confirmed that "the vulnerability crashes Internet Explorer on Windows XP". The vulnerability was resolved on May 1, 2014, with a security update.
Template:See also The adoption rate of Internet Explorer seems to be closely related to that of Microsoft Windows, as it is the default web browser that comes with Windows. Since the integration of Internet Explorer 2.0 with Windows 95 OSR 1 in 1996, and especially after version 4.0's release, the adoption was greatly accelerated: from below 20% in 1996 to about 40% in 1998 and over 80% in 2000.
Approximate usage over time based on various usage share counters averaged for the year overall, or for the fourth quarter, or for the last month in the year depending on availability of reference.
According to StatCounter Internet Explorer's marketshare fell below 50% in September 2010. In May 2012 it was announced that Google Chrome overtook Internet Explorer as the most used browser worldwide.
Browser Helper Objects are also used by many search engine companies and third parties for creating add-ons that access their services, such as search engine toolbars. Because of the use of COM, it is possible to embed web-browsing functionality in third-party applications. Hence, there are a number of Internet Explorer shells, and a number of content-centric applications like RealPlayer also use Internet Explorer's web browsing module for viewing web pages within the applications.
Template:Main While a major upgrade of Internet Explorer can be uninstalled in a traditional way if the user has saved the original application files for installation, the matter of uninstalling the version of the browser that has shipped with an operating system remains a controversial one.
The idea of removing a stock install of Internet Explorer from a Windows system was proposed during the United States v. Microsoft case. One of Microsoft's arguments during the trial was that removing Internet Explorer from Windows may result in system instability. Indeed, programs that depend on libraries installed by IE, including Windows help and support system, fail to function without IE. Before Windows Vista, it was not possible to run Windows Update without IE because the service used ActiveX technology, which no other web browser supports.
Impersonation by malware
The popularity of Internet Explorer has led to the appearance of malware abusing its name. In January 28, 2011, a fake Internet Explorer browser calling itself "Internet Explorer – Emergency Mode" appeared. It closely resembles the real Internet Explorer, but has fewer buttons and no search bar. If a user launches any other browser such as Google Chrome, Mozilla Firefox, Opera, Safari or the real Internet Explorer, this browser will pop-up instead. It also displays a fake error message, claiming that the computer is infected with malware and Internet Explorer has entered Emergency Mode. It blocks access to legitimate sites such as Google if infected users try to access them.
- ↑ SVG Support Tables. codedread.com.
- ↑ Filter Tool (WebFX). webfx.eae.net (May 12, 2005).
- ↑ Using Script Encoder. microsoft.com (May 12, 2005).
- ↑ Font Embedding for the Web. microsoft.com.
- ↑ How to Add a Shortcut Icon to a Web Page. MSDN. Microsoft. Retrieved on March 25, 2014.
- ↑ Davis, Jeff (December 27, 2007). why doesn't the favicon for my site appear in IE7?. jeffdav on code. Microsoft. Retrieved on March 11, 2013.
- ↑ Fun with Favicons. Microsoft (September 7, 2013). Retrieved on November 3, 2013.
- ↑ Windows Core Networking Team. A bit about WinInet's Index.dat. MSDN blogs. Retrieved on March 7, 2008.
- ↑ Internet Explorer 9 Network Performance Improvements
- ↑ 10.0 10.1 10.2 10.3 10.4 10.5 Internet Explorer Architecture. MSDN. Retrieved on January 10, 2007.
- ↑ Wilson, Chris. Inside IE8 Beta 1 for Developers. MSDN Channel9. Retrieved on March 7, 2008.
- ↑ IE8 and Loosely Coupled IE. Retrieved on March 18, 2008.
- ↑ 13.0 13.1 McSherry, Tony (January 20, 2013). A look at Internet Explorer 10 on Windows RT. CBS Interactive.
- ↑ Template:Citation/make link. Belfast Telegraph. December 16, 2008. http://www.belfasttelegraph.co.uk/breaking-news/world/north-america/security-risk-detected-in-internet-explorer-software-14110209.html.
- ↑ Template:Citation/make link. BBC News. December 16, 2008. http://news.bbc.co.uk/2/hi/technology/7784908.stm. Retrieved May 5, 2010.
- ↑ Goodin, Dan (December 9, 2011). Chrome is the most secured browser – new study. The Register. Retrieved on October 15, 2012.
- ↑ Template:Citation
- ↑ Seltzer, Larry (April 14, 2005). The Lame Blame of ActiveX. Security—Opinions. eWeek. Retrieved on April 7, 2006.
- ↑ Lemos, Robert (July 31, 2006). ActiveX security faces storm before calm. Security Focus. Retrieved on July 11, 2009.
- ↑ Secunia 2008 Report. Secunia.
- ↑ Goodin, Dan (November 1, 2010). Internet Explorer info leak festers for 2 years. The Register. Retrieved on November 2, 2010.
- ↑ Naraine, Ryan (November 1, 2010). Two-year-old data leakage flaw still haunts Internet Explorer. ZDNet. CBS Interactive. Retrieved on November 2, 2010.
- ↑ Researchers bypass Internet Explorer Protected Mode (December 3, 2010). Retrieved on December 4, 2010.
- ↑ Mills, Elinor (January 14, 2010). Template:Citation/make link. CNET News (CBS Interactive). http://news.cnet.com/8301-27080_3-10435232-245.html. Retrieved September 26, 2010.
- ↑ Emery, Daniel (January 16, 2010). Template:Citation/make link. BBC News. http://news.bbc.co.uk/1/hi/technology/8463516.stm. Retrieved March 26, 2010.
- ↑ Fildes, Jonathan (January 18, 2010). Template:Citation/make link. BBC News. http://news.bbc.co.uk/1/hi/technology/8465038.stm. Retrieved March 26, 2010.
- ↑ Emily Bourke for AM (January 19, 2010). Govt issues IE security warning. abc.net.au. Retrieved on September 26, 2010.
- ↑ Martinez-Cabrera, Alejandro (January 18, 2010). Template:Citation/make link. The San Francisco Chronicle. http://www.sfgate.com/cgi-bin/blogs/techchron/detail?&entry_id=55509.
- ↑ Govan, Fiona (January 18, 2010). Template:Citation/make link. The Daily Telegraph (London). http://www.telegraph.co.uk/technology/microsoft/7011626/Germany-warns-against-using-Microsoft-Internet-Explorer.html. Retrieved March 26, 2010.
- ↑ Microsoft Security Advisory 2963983. Microsoft (April 26, 2014). Retrieved on April 28, 2014.
- ↑ Finkle, Jim (April 28, 2014). U.S., UK advise avoiding Internet Explorer until bug fixed. Reuters. Retrieved on April 28, 2014.
- ↑ Microsoft Internet Explorer Use-After-Free Vulnerability Guidance. United States Computer Emergency Readiness Team (April 28, 2014). Retrieved on April 28, 2014.
- ↑ Vulnerability Note VU#222929 - Microsoft Internet Explorer use-after-free vulnerability. Carnegie Mellon University (April 27, 2014). Retrieved on April 28, 2014.
- ↑ U.S.: Stop using Internet Explorer until security holes are fixed. Chicago Tribune (April 28, 2014). Retrieved on April 28, 2014.
- ↑ Microsoft warns of Internet Explorer flaw. BBC (April 28, 2014). Retrieved on April 28, 2014.
- ↑ Microsoft Security Bulletin MS14-021 - Critical Security Update for Internet Explorer (2965111). Microsoft Technet (May 1, 2014). Retrieved on July 6, 2014.
- ↑ Market share for browsers, operating systems and search engines. marketshare.hitslink.com.
- ↑ Borland, John. Browser wars: High price, huge rewards, ZDNet, April 15, 2003. Accessed June 2, 2012.
- ↑ TheCounter.com: The Full-Featured Web Counter with Graphic Reports and Detailed Information. Thecounter.com. Retrieved on October 17, 2008.
- ↑ TheCounter.com: The Full-Featured Web Counter with Graphic Reports and Detailed Information. Thecounter.com. Retrieved on October 17, 2008.
- ↑ Template:Citation/make link. Cnn.com. http://www.cnn.com/TECH/computing/9810/08/browser.idg/. Retrieved October 17, 2008.
- ↑ Web Analytics | Online Business Optimization by Omniture. Omniture.com. Retrieved on October 17, 2008.
- ↑ Goldman, David (October 6, 2010). Template:Citation/make link. CNN. http://money.cnn.com/2010/10/06/technology/internet_explorer_market_share/index.htm?source=cnn_bin&hpt=Sbin. Retrieved October 6, 2010.
- ↑ IE Emergency Mode. im-infected.com (January 28, 2011). Retrieved on June 23, 2013.
- ↑ Bleeping Computer – Fake IE Emergency Mode (by fake AVG) (January 28, 2011). Retrieved on June 23, 2013.
- Index DOT Html and Index DOT Css. Browser History: Windows Internet Explorer. Retrieved on December 22, 2013.
- Dean Hachamovitch (July 27, 2005). Windows Vista & IE7 Beta 1 Available. IEBlog. Microsoft. Retrieved on December 22, 2013.
- Wilson, Chris (July 30, 2005). Standards and CSS in IE. IEBlog. Microsoft. Retrieved on December 22, 2013.
- Graff, Scott (October 7, 2006). IE7 Is Coming This Month. IEBlog. Microsoft. Retrieved on December 22, 2013.
- IE7 Platforms And Outlook Express. IEBlog. Microsoft (March 1, 2005). Retrieved on December 22, 2013.
- Gates Highlights Progress on Security, Outlines Next Steps for Continued Innovation. News Center. Microsoft (February 15, 2005). Retrieved on December 22, 2013.
- User Experiences: Evolving the blue "e". IEBlog. Microsoft (September 17, 2010). Retrieved on December 22, 2013.
- Template:Official website
- IEBlog – MSDN Blogs—The weblog of the Internet Explorer team
- Internet Explorer Architecture
- Internet Explorer Community—The official Microsoft Internet Explorer Community
- Internet Explorer History
- IE Leak Patterns—Microsoft's analysis of how web pages can cause memory leaks in Internet Explorer, and how developers can prevent them.