programming4us
           
 
 
Windows

Windows Vista: IE Security Features

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
1/6/2011 3:35:23 PM

Cookies and Privacy Settings

A cookie is a message given to a web browser by a web server, and is typically stored in a text file on the PC’s hard drive. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized web pages for the user. When you enter a website using cookies, you may be asked to fill out a form providing some information as your name and interests. This information is packaged into a cookie and sent to your web browser, which stores it for later use. The next time you go the same website, your browser will send the cookie to the web server. The server can use this information to present you with custom web pages. So, for example, instead of seeing just a generic welcome page, you might see a welcome page with your name on it.

Among other things, cookies are used to keep track of what a person buys, personalize online ordering, personalize a website, store a person’s profile, store IDs, and provide support to older web browsers that do not support host header names. A cookie cannot be used to get data from your hard drive, get your e-mail addresses, or steal sensitive information about you.

From the General tab, you can delete the cookies that are stored on your hard drive. By clicking the Privacy tab, you can determine how much of your personal information can be accessed by websites and whether a website can save cookies on your computer by adjusting the tab slider on the privacy scale.

To view privacy settings, select the Privacy tab on the Internet Options dialog box. To adjust your privacy settings, adjust the tab slider to a new position on the privacy scale. A description of the privacy settings that you select displays on the right side of the tab slider. The default level is Medium; it is recommended to configure Medium or higher. You can also override the default for cookies in each security zone. In addition, you can override certain settings (automatic cookie handling and session cookies) by clicking the Advanced button, or you can allow or block cookies from individual websites by clicking the Edit button.

Many websites provide privacy statements that you can view. A site’s privacy policy tells you what kind of information the site collects and stores and what it does with the information. Information that you should be mostly concerned with is how the websites uses personally identifiable information such as your name, e-mail addresses, address, and telephone number. Websites also might provide a Platform for Privacy Preferences (P3P) privacy policy, which can be used by browsers to filter cookie transactions on the basis of the cookie’s content and purpose. To view the privacy report, open the View menu and click Privacy Report. To view a site’s privacy statement, select the website and click the Summary button.

Content Zones

To help manage IE security when visiting sites, IE divides the network connection into four content types:

  • Internet zone. Anything that is not assigned to any other zone and anything that is not on your computer, or your organization’s network (intranet). The default security level of the Internet zone is Medium.

  • Local intranet zone. Computers that are part of the organization’s network (intranet) that do not require a proxy server, as defined by the system administrator. These include sites specified on the Connections’ tab, network, paths such as \\computername\foldername, and local intranet sites such as http://internal. You can add sites to this zone. The default security level for the local intranet zone is Medium=Low, which means IE will allow all cookies from websites in this zone to be saved on your computer and read by the website that created them.

  • Trusted sites zone. Contains trusted sites that you believe you can download or run files from without damaging your computer or data or that you consider are not a security risk. You can assign sites to this zone. The default security level for the trusted sites zone is Low, which means IE will allow all cookies from websites in this zone to be saved on your computer and read by the website that created them.

  • Restricted sites zone. Contains sites that you do not trust and from which downloading or running files may damage your computer or data, or you just consider them a security risk. You can assign sites to this zone. The default security level for the restricted sites zone is High, which means IE will block all cookies from websites in this zone.

For each of the web content zones, there is a default security level. The security levels available in IE are as follows:

  • High. Excludes any content that can damage your computer.

  • Medium. Warns you before running potentially damaging content.

  • Low. Does not warn you before running potentially damaging content.

  • Custom. A security setting of your own design. Use this level to customize the behavior and Active Data Object (ADO) and Remote Data Services (RDS) objects in a specific zone.

Whenever you access a website, IE checks the security settings for zone of the website. To tell which zones the current web page falls into, you look at the right side of the IE status bar. Besides adjusting the zones or assigning the zones or assigning a website to a zone, you can also customize settings for a zone by importing a privacy settings file from a certificate authority.

To modify the security level for a web content zone, follow these steps:

1.
Click the Tools button, Internet Options.

2.
In the Internet Options dialog box, on the Security tab, click the zone on which you want to set the security level.

3.
Drag the slider to set the security level to High, Medium, or Low. IE describes each option to help you decide which level to choose. You are prompted to confirm any reduction in security level. You can also choose the Custom Level button for more detailed control (see Figure 1).

Figure 1. Security options within IE.


4.
Click OK to close the Internet Options dialog box.

Software publisher certificates (third-party digital certificates) are used to validate software code such as Java or ActiveX controls or plug-ins. Depending on the security settings for a zone, when software code is accessed from a website, you will automatically download the software code, disable the software code, or prompt to download the software code via a security warning. If you open the Tools menu and select Internet Options, select the Security tab, and click the Custom Level button, you can select to enable, disable, or prompt to download ActiveX controls (signed and unsigned) and scripting of Java applets.

To view the certificates for IE, open the Internet Options dialog box, click the Content tab, and then click the Certificates button. To see list of certificates, click the appropriate certificates. From here, you can also import and export individual certificates.

Other -----------------
- Windows 7: Troubleshooting Wireless Network Problems
- Windows 7: Troubleshooting Networking - Troubleshooting the NIC
- Windows 7: Troubleshooting Networking - Troubleshooting Cables
- Windows Vista: Configuring Internet Explorer 7.0 - Common IE Settings
- Windows Vista: Windows Firewall Settings - Computer Connection Security Rules
- Windows7: Troubleshooting Networking from the Command Line (part 2)
- Windows7: Troubleshooting Networking from the Command Line (part 1)
- Windows7: General Solutions to Network Problems (part 2) - Updating the Router Firmware
- Windows7: General Solutions to Network Problems (part 1) - Turning On Network Discovery
- Windows 7: Troubleshooting Networking - Checking the Connection Status
- Windows 7: Troubleshooting Networking - Repairing a Network Connection
- Windows 7: Troubleshooting Startup Using the System Configuration Utility
- Windows 7: Troubleshooting Startup - Recovering Using the System Recovery Options
- Windows 7: Troubleshooting Startup - When to Use the Various Advanced Startup Options
- Windows Vista: Windows Firewall Settings - Advanced Configuration
- Windows Vista: Windows Firewall Settings - Basic Configuration
- Windows 7: Troubleshooting Device Problems (part 3)
- Windows 7: Troubleshooting Device Problems (part 2) - Displaying a List of Nonworking Devices
- Windows 7: Troubleshooting Device Problems (part 1) - Troubleshooting with Device Manager
- Windows 7: Working with Device Security Policies
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us