Internet Explorer 7
Internet Explorer 7 in Windows Vista
|Initial release||October 18, 2006|
|Stable release||7.0.6002.18005 (April 28, 2009[±])|
|Preview release||None [±]|
|Operating system||Windows XP SP2 or later
Windows Server 2003 SP1 or later
|Included with||Windows Vista, Windows Server 2008|
|Platform||IA-32, x64 and IA-64|
|License||Proprietary, requires Windows license|
Internet Explorer versions:
Windows Internet Explorer 7 (IE7) is a web browser released by Microsoft in October 2006. Internet Explorer 7 is part of a long line of versions of Internet Explorer and was the first major update to the browser in more than 5 years. It is the default browser in Windows Vista and Windows Server 2008 and can replace Internet Explorer 6 on Windows XP and Windows Server 2003. Starting from this version, the new Internet Explorer versions do not work with Windows NT 4.0, Windows 98, Windows 98 SE, Windows 2000, and Windows ME.
Some portions of the underlying architecture, including the rendering engine and security framework, have been improved. New features include tabbed browsing, page zooming, an integrated search box, a feed reader, better internationalization, and improved support for web standards, although it does not pass the Acid2 or Acid3 tests. Security enhancements include a phishing filter, stronger encryption on Windows Vista (256-bit from 128-bit in XP), and a "Delete browsing history" button to easily clear private data. It is also the first version of Internet Explorer which is branded and marketed under the name 'Windows', instead of 'Microsoft'.
In 2001, Microsoft released Internet Explorer 6 as an update to Windows 98, Windows ME, Windows NT 4.0, and Windows 2000 and included it by default in Windows XP. With the release of IE6 Service Pack 1 in 2003, Microsoft announced that future upgrades to Internet Explorer would come only through future upgrades to Windows, stating that "further improvements to IE will require enhancements to the underlying OS."
On February 15, 2005 at the RSA Conference in San Francisco, Microsoft Chairman Bill Gates announced that Microsoft was planning a new version of Internet Explorer that would run on Windows XP. Both he and Dean Hachamovitch, General Manager of the Internet Explorer team, cited needed security improvements as the primary reason for the new version.
The first beta of IE7 was released on July 27, 2005 for technical testing, and a first public preview version of Internet Explorer 7 (Beta 2 preview: Pre-Beta 2 version) was released on January 31, 2006.
The final public version was released on October 18, 2006. On the same day, Yahoo! provided a post-beta version of Internet Explorer 7 bundled with Yahoo! Toolbar and other Yahoo!-specific customizations.
In late 2007 Microsoft announced that IE7 would not be included as part of Windows XP SP3, with both Internet Explorer 6 and 7 receiving updates.
Within a year after IE7's release (end of 2006 to end of 2007) support calls to Microsoft had decreased 10-20%.
On December 16, 2008, a security flaw was found in Internet Explorer 7 which can be exploited so that crackers can steal users' passwords. The following day, a patch was issued to fix the flaw, estimated to have affected around 10,000 websites.
|Internet Explorer Market Share|
|Internet Explorer 6||4.4%|
|Internet Explorer 7||2.14%|
|Internet Explorer 8||20.6%|
|Internet Explorer 9||9.0%|
|Internet Explorer 10||11.1%|
|Internet Explorer 11||10.4%|
- On January 31, 2006, Microsoft released a public preview build (Beta 2 preview: Pre-Beta 2 version) of Internet Explorer 7 for Windows XP Service Pack 2 (not for Windows Server 2003 SP 1) on their web site. It stated that more public preview builds (possibly Beta 2 in April) of Internet Explorer 7 will be released in first half of 2006, and final version will be released in second half of 2006. The pre beta build was refreshed on March 20, 2006 to build 7.0.5335.5. A real Beta 2 Build was released on April 24, 2006 to build 7.0.5346.5. In addition, at the MIX'06 conference, Bill Gates said that Microsoft is already working  on the next two versions of IE after version 7.
- On June 29, 2006, Microsoft released Beta 3 (Build 7.0.5450.4) of Internet Explorer 7 for Windows XP SP2, Windows XP x64 Edition and Windows Server 2003 SP1. It features minor UI cleanups, re-ordering of tabs by drag and drop, as well as noticeable performance improvements.
- On August 24, 2006, the Release Candidate 1 (RC1) of Internet Explorer 7 (Build 7.0.5700.6) was released for Windows XP SP2, Windows XP x64 Edition and Windows Server 2003 SP1. This was the last pre-release version of IE7 before the final release.
- On September 28, 2006, 3Sharp, a privately held technical services firm, published the results of a study, commissioned by Microsoft, evaluating eight anti-phishing solutions in which Internet Explorer 7 (Beta 3) came out on top. The study evaluated the ability to block phish, to warn about phish, and to allow good sites.
- On October 18, 2006, the first finished version was released on microsoft.com, and was distributed as a high-priority update via Automatic Updates (AU) on November 1. AU notifies users when IE7 is ready to install and shows a welcome screen that presents key features and choices to "Install", "Don't Install", or "Ask Me Later".
- On November 8, 2006, a version of Internet Explorer 7 was released for Windows Vista only (7.0.6000.16386).
- On November 11, 2006, another version for Windows XP was made available (7.0.5730.11IC).
- On September 24, 2007, Windows Server 2008 RC0 was released with version 7.0.6001.16659.
- On October 4, 2007, the latest version for Windows XP (7.0.5730.13) was made available.
|Major version||Minor version||Release date||Significant changes||Shipped with|
|Version 7||7.0 Beta 1||July 27, 2005||Support of PNG alpha channel. CSS bug fixes. Tabbed browsing.||Windows Vista Beta 1|
|7.0 Beta 2 Preview||January 31, 2006||More CSS fixes. RSS platform integration. New UI. Quick Tabs.|
|7.0 Beta 2||April 24, 2006||Feature complete. More CSS fixes. Application compatibility fixes.|
|7.0 Beta 3||June 29, 2006||Fixes most rendering issues for CSS.|
|7.0 RC 1||August 24, 2006||Improvements in performance, stability, security, application compatibility and final CSS adjustments.|
|7.0||October 18, 2006||Final and current release.||Windows Vista
Windows Server 2008
|7.1||End of 2007||Included in the early builds of Windows 7|
|IE7 Nears its Peak Market Share in 2008
— NetApplications.com, September 2008
|Internet Explorer 4||0.01%|
|Internet Explorer 5||0.06%|
|Internet Explorer 5.5||0.06%|
|Internet Explorer 6||24.67%|
|Internet Explorer 7||46.35%|
|Internet Explorer 8||0.37%|
With this version, Internet Explorer was renamed from Microsoft Internet Explorer to Windows Internet Explorer as part of Microsoft's rebranding of components that are included with Windows.
Internet Explorer 7 introduces the Windows RSS Platform with which it is tightly integrated and can subscribe to RSS and Atom feeds, synchronize and update them on a schedule and display them with its built-in style sheet.
Version 7 is intended to defend users from phishing as well as deceptive or malicious software, and it also features full user control of ActiveX and better security framework, including not being integrated as much with Windows as previous versions, thereby increasing security. Unlike previous versions, the Internet Explorer ActiveX control is not hosted in the Windows Explorer process, but rather it runs in its own process. It also includes bug fixes, enhancements to its support for web standards, tabbed browsing with tab preview and management, a multiple-engine search box, a web feeds reader, Internationalized Domain Name support (IDN), and antiphishing filter. On October 5, 2007, Microsoft removed the 'genuine software' validation before install, which means that all versions of Windows, whether able to pass validation or not, are able to install the browser. The integrated search box supports OpenSearch.
On Windows Vista, Internet Explorer operates in a special "Protected Mode", that runs the browser in a security sandbox that has no WRITE access to the rest of the operating system or file system. When running in Protected Mode, IE7 is a low integrity process; it cannot gain write access to files and registry keys outside of the low-integrity portions of a user's profile. This feature aims to mitigate problems whereby newly discovered flaws in the browser (or in Add-Ons hosted inside it) allowed crackers to subversively install software on the user's computer (typically spyware).
Usability and accessibility
- Version 7 tabs. The user can rearrange tabs by dragging and dropping them as desired.
Privacy and security
- Since it is tightly integrated with the operating system, Internet Explorer makes full use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to that of Windows Explorer. However, with version 7, FTP sites are rendered in a hyper linked page, with the folder-like view available if the site is accessed from Windows Explorer. IE7 can itself launch Windows Explorer for FTP sites.
- Protected Mode (available in Windows Vista only), whereby the browser runs in a sandbox with even lower rights than a limited user account. As such, it can only write to the Temporary Internet Files folder and cannot install start-up programs or change any configuration of the operating system without communicating through a broker process. IE7 Protected Mode relies on the User Account Control technology.
- ActiveX Opt-In blocks ActiveX Control unless it allowed to be installed. This feature improves security from unverifiable and vulnerable controls. ActiveX controls can be chosen to be installed on Information Bar. User can turn on and off ActiveX Control by using Add-on Manager.
- The new Phishing Filter offers protection against phishing scams and other websites that may be considered dangerous for a user to enter their personal information into. When enabled, every website the user visits is checked against a master list of known phishing sites. If a site is listed, the user is informed. In light of the privacy implications of this feature, it is not enabled automatically; the user is asked when they start Internet Explorer 7 if they want it enabled. Microsoft is working in conjunction with companies that specialize in identifying phishing schemes to ensure the list of known sites is accurate and quickly updated.
- The address bar and status bar appear in all windows including popups which helps to block malicious sites from disguising them as trusted sites. Also the address bar features a color code to visually indicate the trustworthiness of the page. The address bar turns red when a page, with invalid security certificate, is accessed. In case of sites not using any encryption, the address bar is white. And if the page uses high security certificate, the bar turns green.
- Modal windows such as dialog boxes are shown only when the tab that has generated them is selected (in such situations, the tab color becomes orange). On the other hand, the save window is modal and when saving the page shown in a tab, the user cannot browse other tabs.
- The status bar no longer allows custom text to be entered (e.g.: "Formatting C:\ 10% Complete |||||||") and will always show the URL of any link hovered over, for security. It now also shows the target URL of form buttons to help identify forms which submit their data to suspicious sites.
- The ability to limit scripting functions, such as those that modify the status bar or adjust the size or position of the browser window was introduced with IE7.
- "Delete Browsing History" cleans the complete browsing history in a single step. Previously this was a multistage process requiring users to delete browser cache, history, cookies, saved form data and passwords in a series of different steps. This is useful for improving privacy and security in a multiuser environment, such as an Internet café.
- Fix My Settings checks at startup or when a setting is changed, if the current settings are unsafe it notifies the user. The user can also press a button in order to fix the settings to a safe state. There is currently no way to disable these warnings.
- Old protocols and technologies removed: Gopher, TELNET, Scriptlets, DirectAnimation, XBM, Channels (.CDF files) also known as 'Active Desktop Items', etc. The DHTML Editing Control is being removed from IE7 for Windows Vista to reduce surface area for security attacks.
- No Add-ons allows IE7 to launch without the installed extensions.
- IE7 cipher strength: 256-bit (Only for Vista, IE7 for XP and Server 2003 only supports 128-bit)
- The address bar turns red when the certificate presented by a secure site has some problems. In that case navigation to the site is blocked by default, and can only be accessed after the user explicitly confirms the navigation.
- IE7 includes support for Extended Validation Certificates (EV). When sites present an EV certificate the address bar is shown in green.
- New Group Policy's Administrative Templates (.adm files) for IE7 are loaded automatically onto the Domain Controller when a Group Policy is opened from a workstation where IE7 has been installed. These new administrative templates allow for controlling the Anti-Phishing filter state, for example.
- Reset Internet Explorer settings Deletes all temporary files, disables browser add-ons, and resets all the changed settings to factory settings. It can be used if the browser is in an unusable state.
Microsoft has addressed security issues in two distinct ways within Windows Vista: User Account Control, which forces a user to confirm any action that could affect the stability or security of the system even when logged in as an administrator, and "Protected-mode IE", which runs the web browser process with much lower permissions than the user.
The first vulnerability exclusive to Internet Explorer 7 was posted after 6 days.
Some users have criticised the phishing filter for being too easy to circumvent. One successful method of bypassing Internet Explorer's Phishing Filter has been reported by redirecting a blacklisted web page to another, non-blacklisted page, using a server-side redirect. Until the new page is blocked as well, the attack can remain active.
This flaw means that phishers can keep links from previous emails functioning by simply moving to a new server when their original web page is blacklisted and adding a redirect.
This has been criticised as doubly serious as the presence of a phishing filter may lull users into a false sense of security when the filter can be bypassed.
- Minor improvements to CSS, DOM, and HTML support have been made. Microsoft's stated goal with version 7 was to fix the most significant bugs and areas which caused the most trouble for developers, however full compatibility with standards was postponed.
- Support for per-pixel alpha channel transparency in PNG images has been added.
The Windows Vista and XP version of Windows Internet Explorer 7 additionally feature an update to the WinInet API. The new version has better support for IPv6, and handles hexadecimal literals in the IPv6 address. It also includes better support for Gzip and deflate compression, so that communication with a web server can be compressed and thus will require less data to be transferred. Internet Explorer Protected Mode support in WinInet is exclusive to Windows Vista.
Although Internet Explorer 7 is more compliant than previous versions, according to all figures it remains the least standards-compliant compared to other major browsers of the period. It passes neither the Acid2 nor the Acid3 tests, two test cases designed by the Web Standards Project to verify CSS compliance.
It is also claimed that lack of support in Internet Explorer is responsible for holding back the widespread adoption by webmasters of several new open technology standards[who?] (SVG, supported elsewhere since 2001, was only available in Internet Explorer using a 3rd party plugin until the release of Internet Explorer 9).
IE7 requires at least:
- 233 MHz processor
- Windows XP SP2.
- Super VGA (800 x 600) monitor with 256 colors.
- Mouse or compatible pointing device.
- RAM (for the browser alone): 64 MB for 32-bit Windows XP/Server 2003, 128 MB for 64-bit Windows XP/Server 2003.
- Emil, Protralinski (April 8, 2014). "Microsoft ends support for Windows XP and Office 2003". The Next Web. Retrieved April 10, 2014.
- Hansen, Evan. "Microsoft to abandon standalone IE". CNET. Retrieved 2008-08-28.
- "Gates Highlights Progress on Security, Outlines Next Steps for Continued Innovation" (Press release). Microsoft. 2005-05-12. Retrieved 2008-08-28.
- Hachamovitch, Dean (2005-02-15). "IE7". IEBlog. Microsoft. Retrieved 2008-08-28.
- Hachamovitch, Dean (27 July 2005). "Windows Vista & IE7 Beta 1 Available". IEBlog at Microsoft Developer Network. Microsoft. Retrieved 10 February 2011.
- Graff, Scott (6 October 2006). "IE7 Is Coming This Month...Are you Ready?". IEBlog at Microsoft Developer Network. Microsoft. Retrieved 10 February 2011.
- "No, Internet Explorer 7 Will Not(!) Be a Part of Windows XP SP3". News.softpedia.com. Retrieved 2011-12-25.
- CDRInfo.COM Team (2007-10-08). "IE7 opens to pirated Windows". Cdrinfo.com. Retrieved 2011-12-25.
- Chor, Tony (2007-11-30). "The First Year of IE7". IEBlog. Microsoft. Retrieved 2008-08-28.
- "Serious security flaw found in IE". BBC News. 2008-12-16. Retrieved 2008-12-17.
- "http://news.bbc.co.uk/1/hi/technology/7787445.stm". BBC News. 2008-12-17. Retrieved 2008-12-17.
- "Global Web Stats". W3Counter. May 2012. Retrieved 2012-06-05.
- "StatCounter Global Stats". StatCounter. May 2012. Retrieved 2012-06-05.
- "Browser Version Market Share". Net Applications. January 2011. Retrieved 2011-01-18.
- "Browser Version Market Share". Net Applications. January 2014. Retrieved 2013-08-12.
- "Internet Explorer 7 downloads". Microsoft.com. Retrieved 2011-12-25.
- "Gates looks to expand view beyond Windows - CNET News". News.com.com. 2006-03-20. Archived from the original on 2013-01-19. Retrieved 2011-12-25.
- "IEBlog : Anti-Phishing Accuracy Study". Blogs.msdn.com. 2006-09-28. Retrieved 2011-12-25.
- "Gone Phishing: Evaluating Anti-Phishing Tools for Windows" (PDF). www.3sharp.com. September 2006. Archived from the original on 15 October 2007. Retrieved 10 February 2011.
- Microsoft Knowledge Base with version listing, January 19, 2007
- "Browser Version Market Share". NetApplications.com. September 2008. Retrieved 2008-10-05.
- "Top Browser Share Trend". NetApplications.com. September 2008. Retrieved 2008-10-05.
- Article regarding Internet Explorer 7's integration into windows, March 24, 2006
- "Understanding and Working in Protected Mode Internet Explorer". MSDN – Internet Explorer Development Technical Articles. Microsoft. January 2006. Retrieved 2006-04-13.
- "Introducing Internet Explorer 7". 2006-05-26. Retrieved 2006-11-30.
- Phishing Filter in IE7, IEBlog
- New enhancements to Phishing Filter protection for IE, IEBlog
- B. Ashok (June 27, 2006). "A Note about the DHTML Editing Control in IE7 for Windows Vista". IEBlog. MSDN Blogs. Retrieved 2006-06-27.
- "Protected Mode in Vista IE7". Internet Explorer team blog. Microsoft. February 9, 2006. Retrieved 2006-04-07.
- "Internet Explorer 7 Window Injection Vulnerability". Secunia.com. Retrieved 2011-12-25.
- "Universal Phishing Filter Bypass". Alex's Corner blog. Individual entity. February 14, 2008. Retrieved 2008-02-14.
- Nick Mediati. "Internet Explorer 8 Beta 2: Can It Outfox Firefox?".
- "Get Windows Internet Explorer Logo". Microsoft TechNet. October 18, 2006. Retrieved 2012-03-07.
- IE7 Transparent PNG Implementation, IEBlog
- "IE's Gzip and deflate support". Blogs.msdn.com. 2005-10-31. Retrieved 2011-12-25.
- "IE already supports Gzip and deflate". Blogs.msdn.com. 2005-06-06. Retrieved 2011-12-25.
- Web browser standards support summary. Web Devout.
- Svensson, Peter (2008-09-10). "Creator of Web spots a flaw in Internet Explorer". msnbc.msn.com. Retrieved 2008-11-16.
- "SVG in IE9 Roadmap - IEBlog".
- "Internet Explorer: System Requirements". Microsoft. Retrieved 2009-10-12.
- Internet Explorer: Home Page
- IEBlog — The weblog of the Internet Explorer team
- Internet Explorer Community — The official Windows Internet Explorer Community
- Internet Explorer Tips
- Serious security flaw found in IE
- "Microsoft Windows Family Home Page". Windows History: Internet Explorer History. Retrieved May 12, 2005.
- "IEBlog". Standards and CSS in IE. Retrieved July 29, 2005.
- "IEBlog". IE7 Platforms And Outlook Express. Retrieved May 12, 2005.