Chapter 9: Configuring Internet Explorer
Download
1 / 12

Internet Explorer - PowerPoint PPT Presentation


  • 216 Views
  • Updated On :

Chapter 9: Configuring Internet Explorer Internet Explorer A web browser used to search and view information on the internet or an intranet HTTP The main protocol for making web requests Hypertext Transport Protocol is used to transfer requests and information between servers and browsers.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Internet Explorer' - medwin


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Internet explorer l.jpg
Internet Explorer

  • A web browser used to search and view information on the internet or an intranet

    • HTTP

      • The main protocol for making web requests

      • Hypertext Transport Protocol is used to transfer requests and information between servers and browsers.

    • FTP

      • Mainly used to transfer files between computers on the internet

      • File Transfer Protocol

      • Can either be anonymous or with a username and password

      • Permissions are set at the server


Internet explorer usability features l.jpg
Internet Explorer Usability Features

  • Reorganized user interface

    • To reduce clutter and maximize web page viewing area

  • Instant Search box

  • RSS support

  • Tabbed browsing

  • Pop-up blocker

  • Add-on support

  • Favorites center


Instant search l.jpg
Instant Search

  • Quickly search selected search provider

  • Change default search provider

  • Create custom search provider


Configuring rss l.jpg
Configuring RSS

  • Really Simple Syndication

  • XML-based technology

  • Subscribe to feeds

    • Such as Microsoft TechNet

  • Feed options

    • Under Favorites Star

    • Automatically download attachments

    • Automatically update feeds

      • How Often

      • How Many


Slide6 l.jpg

Configuring Add-ons

  • Add-ons extend functionality of browser

    • Improve usability, security, or provide entertainment.

  • Created by third-parties

  • May cause instability

  • Enable or disable add-ons

    • Tools toolbar, then Manage Add-ons

  • Internet Explorer (No Add-ons)

    • To run IE without installed add-ons running: Start>All Programs>Accessories>System Tools> Internet Explorer (No Add-Ons)


Pop up blocker l.jpg
Pop-up Blocker

  • Prevents pop-ups from being displayed

  • On by default, but not all pop-ups are bad

  • Selectively enable pop-ups

    • Information Bar

    • Pop-up Blocker Settings dialog box

    • Exceptions in Tools, Pop-up blocker, Pop-up blocker settings


Internet explorer security features l.jpg
Internet Explorer Security Features

  • Phishing Filter

  • Improved privacy features

  • Security Status Bar

  • Parental controls

  • Protected Mode


Phishing filter l.jpg
Phishing Filter

  • Prevents malicious websites from masquerading as legitimate websites, such as PayPal, in order to get personal information

    • An email sent by someone masquerading as legitimate site, will ask for your credentials or financial information and link you to their site for collection.

  • Automatic website checking

    • Polls Microsoft against a list of known fraudulent websites

  • Report websites believed to be malicious


Parental controls l.jpg
Parental Controls

  • Monitor and restrict computer usage

    • Internet usage

    • application usage

    • enforce time-limits

  • Configured only on standard user accounts, by administrators

  • Allow list

    • Allows only the websites listed


Protected mode l.jpg
Protected Mode

  • Isolated environment

  • Prevents code from being run on system files, unless the user explicitly allows the access

  • Configured on Security tab of Internet Properties dialog box


Internet privacy l.jpg
Internet Privacy

  • Delete Browsing History

    • Temporary Internet Files

    • Cookies

    • History

    • Form data

    • Passwords


ad