Described herein is a technique of protecting users against certain types
of Internet attacks. The technique involves obtaining certificates from
visited web sites and qualifying communications with those web sites
based on the content of the certificates.