Presentation is loading. Please wait.

Presentation is loading. Please wait.

Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.

Similar presentations


Presentation on theme: "Configuring and Troubleshooting Internet Access Chapter 9 powered by dj."— Presentation transcript:

1 Configuring and Troubleshooting Internet Access Chapter 9 powered by dj

2 Chapter Objectives  Configure Internet Explorer 7  Use Pop-up Blocker  Work with IE7 Security and Privacy Options  Explain Remote Assistance  Explain Remote Desktop  Configure Windows Mail  Work with Windows Calendar and Contacts powered by dj

3 Recall  The various security threats are Virus, Worm and Spyware  Spyware is software that is installed on the user’s computer without the user’s consent. It runs on the background and performs undesirable tasks  A firewall protects the system from the outside threats by blocking the unauthorized traffic while allowing the authenticated ones to enter powered by dj

4 Configuring Internet Explorer 7  Internet Explorer 7 is the new version of the Internet Explorer web browser  Some of the components are :  Quick Tabs  Address bar  Tabs and New Tab  Instant search box  Command bar  Zoom  Favorites Center  Status Bar powered by dj

5  Practical Activity: Demonstrate a procedure to subscribe to a RSS Feed. (10 min) powered by dj

6 Configuring News Feeds  News feeds also known as RSS, web, XML feeds  RSS mainly used for news and blog websites  Identify the RSS feeds on the currently opened website by viewing the orange color button in the command bar  After subscribing, you can get the regenerated items on the website in your RSS feed after a fix interval of time powered by dj

7 Configuring the Search Bar and Adding Search Providers  Many search providers for IE7:  AOL search  Ask Jeeves  Yahoo search  Microsoft live search  Use of instant search box  Use of address bar powered by dj

8  Practical Activity: Demonstrate the procedure to add search providers to a search bar.(5 min) powered by dj

9 Pop-up Blocker  Pop-up is any Web page that opens in its own separate browser window  When any new window opens automatically, it interrupts while reading the content  Pop up blocker arise with the message ‘Pop- up blocked’ on the information bar when it identifies the incoming advertising window  By default the Pop up blocker is turned on powered by dj

10  Practical Activity: Demonstrate a procedure to turn off a pop-up blocker. (2 min) powered by dj

11 Working with Custom Filter Levels  Pop-up blocker provides three levels for filtering pop-ups:  Low – Allows to open all the windows for a websites except those who take place automatically  Medium – Blocks most automatic pop-ups, but not pop- ups that open when you click a link  High – Suppress all the new windows including those windows that are opened by clicking on the link  Change the filter level as per your requirement powered by dj

12 Allowing Pop-ups from Certain Sites  IE7 also allows for adding pop-ups because some websites might not work properly if they are not allowed for generating the pop-up  By blocking the website, pop-up blocker prevents to appear the window powered by dj

13  Practical Activity: Demonstrate a procedure to change the filter level. Demonstrate a procedure to allow pop- up blocker from a specific site. Ask the students to block a pop-up from a site. (15 min) powered by dj

14 Configuring Notification Options  When the pop-up blocker prevents the window to appear, informed by :  The Information bar appears with the message  In the status bar icon appears  A sound is played  Use of Information bar - Information bar appears where the Internet explorer display information about security, blocked pop-up windows and other activities powered by dj

15  Question for group discussion – What is pop-up blocker? (2 min) powered by dj

16 IE7 Security and Privacy Options  Security is the most important because of increases Internet attackers  Configure security settings to protect your computer  IE7 for Windows Vista provides security features  Protected mode browsing  Phishing filter  Pop-up blocker  Security zone powered by dj

17 Introducing Website Certificates  Web certification provides secure transactions on the Internet  A padlock icon near the address bar for a secured website  Find an error message, if encounter the certificate expired or invalid problem  The Address bar color changes to:  Pink  Green  Yellow powered by dj

18  Question for group discussion – What is Phishing filter? (2 min) powered by dj

19 Checking the misleading Websites using Phishing Filter  Phishing is a trick, used to hack personal or financial information through email messages and website by the hacker  Phishing Filter runs in the background while you browse the web  If the visited side is on the list of reported phishing websites, Internet Explorer will display a warning webpage and a notification on the Address bar powered by dj

20  Practical Activity: Demonstrate a procedure to turn on the phishing filter. Demonstrate a procedure to disable the Phishing Filter. (10 min) powered by dj

21 Using Security Zones  Websites can be assigned to the security zones by specifying the security settings Security ZoneSecurity LevelAllowed for adding sites manually InternetMedium – highNo Local InternetMedium – lowYes (but detect the site automatically) Trusted SitesMediumYes Restricted SitesHighYes powered by dj

22  Practical Activity: Demonstrate a procedure to add a site to a trusted zone. (10 min)  Question for group discussion – What is trusted zone? (2 min) powered by dj

23 Managing Cookies  Cookies are small text files that store the user information on the computer  Types of cookies are:  Temporary or Session cookies  Persistent or saved cookies  First-party cookies  Third-party cookies  The privacy settings options for the Internet zone:  Block All Cookies  High  Medium High  Medium (default)  Low  Accept All Cookies powered by dj

24  Practical Activity: Demonstrate a procedure to block all cookies from a Website. Demonstrate a procedure to do advance privacy settings. (10 min) powered by dj

25 Managing Web-based Information  Internet Explorer tracks different things such as :  Temporary Internet Files - Stores images, multimedia files and even full copies of web pages  Cookies – Small text files stores on the computer  History – Internet Explorer records and stores a list of all web sites that have been visited  Form data – It stores that data which you enter into a form on a websites  Passwords – The chosen password will be stored by the browser and make it avail the next time you visit that web page powered by dj

26  Practical Activity: Demonstrate a procedure to delete the browsing history. (5 min) powered by dj

27 Remote Assistance  A technology that allows expert to connect to the remote computer to support user to troubleshoot the problem arises while working  Provides a direct connection between two computers over the Internet or a local area network  Windows Vista contains the Windows Firewall feature that create the blockage for end-to-end communication in Remote Assistance  To solve this trouble you have to enable the exception in Windows Firewall powered by dj

28  Practical Activity: Demonstrate a procedure to enable the exception in Windows Firewall. Demonstrate a procedure to enable the computer for receiving Remote Assistance connections. (15 min) powered by dj

29 Activating and Securing Remote Assistance  Windows Vista enables to send the remote assistance invitation  For connecting two computers within a network by Remote assistance, the computer should be enabled for receiving Remote Assistance connections powered by dj

30  Practical Activity: Demonstrate a procedure to create and send a Remote Assistance invitation through Help and Support and to create a Remote Assistance invitation.(15 min) powered by dj

31 Exploring a Remote Assistance Session  Remote Assistance invitation is file contains an encrypted string  The invitation file can be edited using the text editor such as Microsoft notepad  Windows Vista allows to send the Remote Assistance invitation using Help and Support center  Windows Vista allows to save the invitation message with another file name at different location at your computer powered by dj

32  Practical Activity: Demonstrate a procedure to open the Remote Assistance invitation by Help and Support Center. (10 min) powered by dj

33 Using an Invitation to Establish a Connection  After receiving the invitation:  Open it by double-clicking the invitation file  Enter the password transferred by the host  Alternatively, you can open it by Windows Help and Support center powered by dj

34 Managing the Remote Assistance Session  Windows Vista provides the Remote assistance panel to manage the Remote Assistance session  The Remote assistance panel contains :  Disconnect  Request Control  Stop sharing  Pause  Settings  Chat  Send file  Help powered by dj

35 Troubleshooting Remote Assistance  Verify the network connectivity of both host and expert  Configure the windows firewall settings with its advanced security powered by dj

36 Remote Desktop  Similar to the Remote Assistance, but both are used for different purpose  Remote Desktop does not require anyone to be logged on or to approve the session powered by dj

37 Configuring Remote Desktop  Need administrative privileges. When you try to enable the desktop, three options available:  Don’t allow connections to this computer  Allow connections from computer running any version of remote desktop (less secure)  Allow connections from computer running remote desktop with network level authentication (more secure) powered by dj

38 Remote Desktop Users Group  By activating the Remote Desktop connection, you can not able to connect to all the users  Connect that user who has been added to your Administrators local group  For connecting another people, you can add the user account to Remote Desktop Users group powered by dj

39 Remote Desktop Connection Application  Windows Vista allows you to create a Desktop connection  Used with Aero Interface  Possible to view a good quality video using Remote Desktop over a LAN connection powered by dj

40  Practical Activity: Demonstrate a procedure to enable the Remote Desktop on Windows Vista. Demonstrate a procedure to add a user account to the Remote Desktop Users group. Demonstrate a procedure to open the Remote Desktop connection application. (20 min) powered by dj

41 Troubleshooting Remote Desktop  Check that the user you are trying to connect should be a member of the Remote Desktop Users Groups  Verify that the firewall in computer must not be configured to allow Remote Desktop connections  The problem may occur due to the advanced security in Windows firewall  Extra firewall between both the computer’s might be blocking your connection powered by dj

42 Windows Mail  Windows Vista uses the new Windows Mail feature as the default e-mail client as well as newsgroup reader  Differences between Windows Mail and Outlook Express are :  File format  Contact information  Search Box  Junk E-mail filter powered by dj

43 Configuring and Using Windows Mail  Mails can be viewed by defining views  Contains a search tool  Allows to join various newsgroups, called communities  For the first time, the Internet Connection wizard opens to set up a mail account  Various settings can configured like rules, views, junk e-mail filter Types of search mode Simple search Advanced search powered by dj

44  Practical Activity: Demonstrate a procedure to create a mail account. Demonstrate a procedure to create mail, attached a file and send an e-mail.(30 min) powered by dj

45 Troubleshooting Windows Mail  Unable to send messages  Unable to receive messages  Unsure whether your Windows Mail is working properly  Error message that says incoming or outgoing servers are not available  Mail box is full  Message moved to Junk E-mail folder powered by dj

46  Practical Activity: Demonstrate a procedure to search an e-mail. (6 min) powered by dj

47 Windows Calendar and Contacts  Windows Calendar is a scheduling application  It supports iCalender  Windows Vista allows you to create a new appointment in Windows Calendar powered by dj

48 Creating New Contacts  Provides the flexibility to add a contact with minimal information like the name or nickname  Various other details like phone, address, website, work details, birthday, anniversary, family members and notes can be added  A contact can be created manually using the New Contact button powered by dj

49  Practical Activity: Demonstrate a procedure to create a new appointment. (10 min) powered by dj

50 Creating a Distribution List  Windows Contacts allows you to put together a set of contacts to form a contact group called distribution list  Advantage - Do not have to manually select all the contacts one by one powered by dj

51  Practical Activity: Demonstrate a procedure to create a new contact. Demonstrate a procedure to create a distribution list (Contact Group). (15 min) powered by dj

52 Summary I  Internet Explorer web browser provides the new version 7 (IE7). With IE7, the daily tasks such as searching, tabbed browsing, printing, viewing, discovering and subscribing RSS feeds becomes easier  By default, IE7 hides the toolbar. You can view the toolbar by pressing Alt key from the keyboard  IE7 provides the way to add a search provider to the search bar  IE7 provides the pop-up blocker features to prevent the interruption of automatically opened advertisement window. It provides you to apply the pop-up to the security zone  Pop-up blocker provides three levels for alertness Low, Medium and High powered by dj

53 Summary II  IE7 provides the phishing filter feature. This feature makes difference between the original and phishing site that prevents the attackers from stealing your personal detail  IE7 provides four security zones namely internet, local intranet, trusted sites and restricted sites  Cookies are small files that store the user information on the computer. Cookies are not usually harmful  A Remote Assistance invitation is an XML file that is automatically created by mail delivery software. The invitation file can be edited using the text editor such as Microsoft notepad. The invitation is saved by Invitation.msrcincident default name powered by dj

54 Summary III  The Remote assistance panel contains the controls such as Disconnect, Request Control, Stop sharing, Pause, Settings, Chat, Send file and Help  If the Remote Assistance session is not working properly, first you should verify the network connectivity of both host and expert. If the network connectivity exists, but still the Remote Assistance session is not working, you should configure the windows firewall settings with its advanced security  Remote Desktop connection provides different tabs such as General, Display, Local Resources, Programs, Experience and Advanced that are used for different functioning powered by dj


Download ppt "Configuring and Troubleshooting Internet Access Chapter 9 powered by dj."

Similar presentations


Ads by Google