Internet Explorer Construction Kit for Dummies
Whether you personalize your browser or build one just for your business, you can include features and functions not available with traditional browsers, including:
- Log file: a list of all Web sites visited
- Alarm: an audible or popup alarm that signals the end of the time period used with the countdown timer
- Lock: prevents the custom browser from further browsing
- Approved list: list of Web sites to which browsing is limited
- Spy: screen captures taken once a minute
- Popular sites: a list of the most-visited sites
You can make your browser G-rated. That’s great if you have curious kids and are concerned about adult sites and Internet safety or simply want to limit their browsing time. The ability to limit access to specific sites also comes in handy if you own a business and want customers in your store to be able to browse your online catalog, but not to comparison shop!
Written (and more importantly, programmed) by Clayton Walnum, author of Standard C++Bible and many other computer books, Internet Explorer Construction Kit For Dummies takes you step-by-step through:
- Adding borders to give your browser a graphical theme
- Using window skin to add an image to your window’s background
- Making the bar scene —assembling the toolbar, designing the menu bar, pulling together the status bar, and customizing the address bar
- Creating buttons and icons
In addition to your Browser Construction Kit, the bonus CD-ROM includes several sample projects you can create, sample graphics for creating custom buttons and skins, and an evaluation version of Paint Shop Pro8 so you can get down to work. You even have everything you need to create a browser with themed graphics, choosing from animal, art, music, sea, sports, or more.
Have fun creating your own personalized, custom-built browser. That way, it will be done just right for you!
Table of Contents
Part I: Making Your Own Internet Explorer.
Chapter 1: Exploring the Benefits of Browser Customization.
Chapter 2: Figuring Out What’s Customizable.
Chapter 3: Meeting the Browser Construction Kit.
Part II: Customizing the Look of the Browser.
Chapter 4: Designing the Browser Window.
Chapter 5: Adding the Browser Pane.
Chapter 6: Assembling the Toolbar.
Chapter 7: Designing the Menu Bar.
Chapter 8: Pulling Together the Status Bar.
Chapter 9: Customizing the Address Bar.
Part III: Creating Browser Graphics.
Chapter 10: Introducing Paint Shop Pro.
Chapter 11: Jazzing Up Your Browser with Borders.
Chapter 12: Painting Skins.
Chapter 13: Creating Toolbars.
Chapter 14: Painting Status Bars.
Chapter 15: Manufacturing Buttons.
Chapter 16: Producing Icons.
Part IV: Controlling the Behavior of the Browser.
Chapter 17: Controlling Access to Internet Sites.
Chapter 18: Incorporating Passwords and Tracking Time Online.
Chapter 19: Keeping Track of Visited Sites.
Chapter 20: Exploring a Browser Script File.
Part V: Designing Customized Web Browser Projects.
Chapter 21: Developing a General-Use Web Browser.
Chapter 22: Coming Up with a Child’s Web Browser.
Chapter 23: Designing a Special-Topic Browser.
Chapter 24: Developing a Dedicated-Site Browser.
Chapter 25: Creating a Spy Browser.
Chapter 26: Designing a Library Browser.
Chapter 27: Getting a Laugh with an April Fool’s Browser.
Chapter 28: Constructing a Sheet-Metal Browser.
Part VI: The Part of Tens.
Chapter 29: Ten More Browser Ideas.
Chapter 30: Ten Tools and Resources for Web Browser Builders.
Appendix: What’s on the CD-ROM.
Sign up now »
- FTR&D EngineerSA
- FTFlash / ActionScript Developer - ContractNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTSenior Python DeveloperNSW
- FTSenior Python Web Applications DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTLead Software EngineerSA
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the ...
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
"Too little too late. Spice normally has better standards than this. I ..."
Spiceworks' free management software gets integrated MDM
- Microsoft may be scanning your Skype messages
- Researchers find critical vulnerabilities in popular game engines
- Pentagon clearance for iOS could open even more doors for Apple in the private sector
- Digital strongboxes won't solve whistleblower problem for journalists
- ACMA database keeps finger on Australia’s malware pulse
- Commonwealth Bank leads four Australian brands in the 2013 top 100 Global brands list
- More Australians are using mobiles to connect to social media: report
- Oo.com.au partners with Responsys to overhaul digital customer strategy
- Coles Flybuys wins over Aussie consumers in new customer loyalty schemes report
- Tablet advertising exceeds smartphone spend in March quarter: IAB