Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Test yourself better with 300 extra Security+ questions!
Get It Here!

Custom Search

Table Of Contents  CertiGuide to Security+
 9  Chapter 2:  Communication Security (Domain 2.0; 20%)
      9  2.3  The Web

Previous Topic/Section  Java Script
Previous Page
Pages in Current Topic/Section
Next Page  Buffer Overflows
Next Topic/Section  ActiveX
(Page 1 of 2)

ActiveX is a Microsoft technology for downloading miniature executable programs (generally called ActiveX controls) to client machines and then executing them to enhance the user experience of the web site. Like Java Script and Java applets, ActiveX controls are most often used to provide fancier graphics or enhanced user interface functionality, beyond what is supported by HTML.

Unlike Java Script and Java applets, ActiveX controls consist of machine code instructions, and must be specifically compiled for the processor and operating system on which they will run. This means that at this point, and probably the foreseeable future, they’re usually limited to running on Windows/Intel machines (since other processor architectures like Alpha have fallen out of favor with Microsoft). It’s possible to write ActiveX controls that will work with PocketPC devices, but due to the limitations of the PocketPC platform, and the requirement that if you do this, you’d have to have separate pages aimed to Windows/Intel and Pocket PC platforms, ActiveX controls are primarily used on the web only for Windows/Intel machines.

ActiveX technology is somewhat similar to Java technology in that both provide a way to automatically download and run programs within the web browser window, but the two differ considerably in terms of their security model. In the Java applet model, any action that might be used for suspicious purposes (such as writing a file to disk or doing other things to interact with the electronic world outside the java applet’s safe run-time “sandbox”) is considered suspect (and often denied).

Quick navigation to subsections and regular topics in this section

Previous Topic/Section  Java Script
Previous Page
Pages in Current Topic/Section
Next Page  Buffer Overflows
Next Topic/Section

If you find useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $

Home - Table Of Contents - Contact Us

CertiGuide for Security+ ( on
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al. Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.