Home » Full Forms » Computer Acronyms/Abbreviations

What is the full form of BHO?

Full form of BHO: Here, we are going to learn what does BHO stands for? BHO – which is an abbreviation of "Browser Helper Object" in Computer Acronyms/Abbreviations, etc.
Submitted by Anushree Goswami, on April 26, 2020

BHO: Browser Helper Object

BHO is an abbreviation of "Browser Helper Object".

It is a plug-in, which is programmed as a dynamic link library for Microsoft Internet Explorer. It is an add-on, created to enhance the functionality of the web browser. They generally come into sight as an application in the form of toolbars, search helpers, and applications, which are sometimes used for monitoring. The use of some of the BHOs are safe but as it can be used to enhance functionality by adding features of the browser, there can be many other BHOs in the form of spyware and malware which can be used to monitor the user’s visiting sites by hijacking, stealing the user's data and doing further malicious activities.

The API of BHO provides the authority to the BHO to access the Document Object Model (DOM) of the page, which is at present in use by the user and to manage the navigation of the page. These types of access authorization show the existence of malware and spyware in the form of BHOs, as BHOs comprise the authority of clear and open access to the Microsoft Internet Explorer toolbars.

BHO History

  • In one of the ending months of 1997, BHOs were launched with the introduction of Internet explorer's version 4.
  • BHOs don't come into notice until the launch of add-on manager in the internet explorer version 6 with the introduction of Service Pack 2 for Windows XP that permit users to enable and disable add-on extensions in their browser's toolbar, according to their requirements of privacy and protection.
  • Many free applications and tools are also available, which permit the user's to disable malicious extensions and BHOs.

Identification of BHOs

  • A user can check the section of tools, to look over the currently installed BHOs.
  • A user can manage add-ons, by installing some safe and recommended tools and applications to filter the access of BHOs.
  • Many anti-spyware and anti-malware applications are also available, to identify and eradicate the malicious applications and tools of the browser which are either monitoring the user’s access data or doing some kind of malicious activity.





Comments and Discussions

Ad: Are you a blogger? Join our Blogging forum.





Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates


© https://www.includehelp.com some rights reserved.