Make Google Your Search Engine With Safari

Step By Step Instructions

Open your browser and click on the little star icon in the top right hand corner of the browser window.

set your homepage on safari - step 1 Then you will want to click on preferences.

set your homepage on safari - step 2 A window will open with 10 tabs. Make sure you are in the General tab. Once you’re in the general tab look for”Homepage”and the “Set To Current Page” button. You can change your default search engine to whatever you desire.

set your homepage on safari - step 3

Download Safari Browser 


No we are not talking about a trip to Africa to see the lions and the elephants. We are looking at the Safari web browser, and examining its history and development, as well as its usability and security features. Until very recently, in fact, right up until 1997, Apple Macintosh computers were made with the web browser Cyberdog, and the web browser Netscape Navigator, however, later on Internet explorer for Mac was also included as a default web browser. What happened was that Apple entered into a five year agreement with Microsoft, and the result was that their web browser became part of Make Google Your Search Engine With Safari securitythe Apple computers setup. Microsoft released various versions of the internet explorer for mac. If you go back and count, you will see that they released three versions. This was done for the MAC OS 8 and MAC OS 9. However, Netscape navigator was still included, this was included to serve as a possible alternative, in the event that the user preferred it. Microsoft eventually released a version of internet explorer for mac, which was called MAC OS X. This was then included as a default browser. But as we know all too well, in the world of software, things develop and develop fast. In 2003, Steve Jobs had an announcement to make. And what was his announcement? He announced that Apple in fact had developed their very own browser. This browser was called Safari. They released it on 7 January 2003. A few versions followed afterward, until version 1.0 was released in June 2003. It was included with internet explorer as the default browser for Mac. In 2005, Safari was included with Mac as the only default browser. Apple released various improved versions of Safari. In January 2010 they released the final stable version of Safari 2. This version addressed many layout and usage issues. It was the last version to be released until 2012.

Usability features

Make Google Your Search Engine With Safari

Make Google Your Search Engine With Safari

Safari uses Apple’s webkit to render web pages. It also uses Apple’s webkit to run javascript. What does webkit consist of? Webkit consists of webcore and it consists of javascript core. The layperson will be asking, but what is webcore and what is javascript core? They are easily described as free software. This free software is released under the GNU Lesser General Public Licence, so the terms of this licence agreement are applicable to the use of the free software. Furthemore, Apple releases additional code under a BSD like licence. Before Safari 6 arrived, they included in it a web feed aggregator. This was built into the product. What is a web feed aggregator? A web feed is also called a news feed. Basically it is a data format. What is it used for? It is used for providing frequently updated content to users. A web feed is syndicated by the distributors of content. This allows users to subscribe to it. Aggregation occurs when you make multiple web feeds (or a collection of web feeds) available in one spot. This task is performed by an aggregator. Often, a web feed can also be called a syndicate feed. Getting back to usability features, the web feed aggregator that was built into Safari, supported both the RSS and Atom standards. Private browsing is one of the features that is currently available. Private browsing is a particular form of browsing whereby no record of the browse or browse history is kept in the browser. Thus, there is no record of information kept in the browser, reflecting the user’s web activity. This is simply achieved by asking websites not to track you. This browser also allows you to email complete webpages. This can be emailed straight from the browser menu. You can also search bookmarks, and share tabs between certain devices.

Security features

Browser security is very important. It involves the application of internet security to internet browsers. This protects computer systems and networked data from malware or breaches of privacy. Security breaches of computer systems do happen. Often exploits of browsers use javascript. Exploits can take advantage of vulnerabilities. Vulnerabilities are holes in security that can be exploited in various browsers. These holes need to be patched. Apple does take steps to prevent dangerous plug ins from running on Safari. They maintain a plug in blacklist. This blacklist can be remotely updated.

They have already blocked certain versions of Flash and versions of Java. In 2008, a competition was held in Vancouver, British Columbia at a security conference. An attempt was made to exploit Safari and the attempt  was successful. MAC OS X was the first OS to be successfully hacked in a hacking competition. Competition entrants were tasked with having to compete with each other to find  a way to read the file contents of a file that was on the user’s desktop. They had to achieve this in one of three operating systems. The three operating systems were; Mac OS X Leopard, also there was Windows Vista SP1, and finally there was Ubuntu7.10. The first day of the competition was exclusively for network attacks. The second day of the competition, entrants were allowed to physically touch the computers, an entrant by the name of Charlie Miller managed to compromise the Mac OS X. He did this via a vulnerability that was unpatched. This vulnerability was found in the PCRE library that Safari uses. However, the entrant Charlie Miller was well aware of this vulnerability before he even entered the competition. He didn’t announce his intention, but he did work at exploiting this vulnerability from before the start of the conference. This is however quite the norm for this type of competition, so it was quite acceptable. This vulnerability, once identified, was then patched up by Safari. This flaw, among other flaws, was then patched up. In 2009, the same individual did it again. He hacked into a Mac by completing another successful exploit. He again acknowledged that he had prior knowledge of the flaw, and worked at exploiting it. He acknowledged that he had done much research on the topic, and that was how he had been able to do it. A patch for this exploit was later released by Apple.