Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Safer, Speedier and Sexier Surfing with Safari. Which Web Browser?
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
1 Secure Interaction Design Kami Vaniea. 2 Overview Designing secure interfaces  Design principles Firefox extensions  Cookies  Phishing  Tracking.
Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Lesson 4: Web Browsing.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
The New Internet Explorer 7 By Ronald Pastor. Overview  Makes everyday web surfing easier –Internet Explorer 7 provides improved navigation through tabbed.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Internet Explorer Today & Tomorrow Margaret Cobb Internet Explorer Product Manager Windows Client Group microsoft.com Microsoft Corporation.
Ceren Bakkaloglu. Tabbed browsing Tab groups Streamlined Interface Advanced printing Instant search box RSS feeds Page zoom Active-X opt ins Security.
Leading at Every Turn. 1)Make sure you have your Trusted Sites configured properly in Internet Explorer 2)Store your credentials on your PC so you.
Cyra Richardson Microsoft Corporation Internet Explorer 7.
Microsoft ® Official Course Module 9 Configuring Applications.
Internet safety By Lydia Snowden.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Windows Internet Explorer 7 – Illustrated Essentials Unit B - Getting the Most from Internet Explorer 7.
Internet Explorer: powering the internet since 1995! Microsoft’s Internet Explorer has come a long way since its introduction in 1995, when it was released.
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Using Windows Firewall and Windows Defender
1. 2 Windows Live Hotmail  offers access via special Outlook Connector software o provides a two-way sync for  mail  calendar  contacts o access.
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Internet Explorer 7. Cut through the clutter. Redesigned streamlined interface –Maximizes the area of the screen that displays the webpage.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 5: Configuring Internet Explorer and Supporting Applications.
XP Browser and Basics COM111 Introduction to Computer Applications.
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
NetTech Solutions Supporting Internet Explorer in Windows XP Lesson Eleven.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Internet Explorer 7 Safari 4 & 5 Internet Explorer 8 Firefox 7.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 1 1 Committed to Shaping the Next Generation of IT Experts. The Online Experience Robert Grauer,
Windows Administration How to protect your computer.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Browsing Tips Mozilla Firefox. About Firefox Available at Available at Maintained.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Dr. Cyrus ED 217 Jacob Camacho.  A user friendly tool.  Can be accessed at campus.uogdistance.com  Easily accessible, useful in posting blogs, assignments,
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 4 Installing and Configuring Applications.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Lesson 4: Web Browsing.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
Lesson 4: Web Browsing.
Dongwhan Kim Annie Zhao Steven Lawrance
Windows Vista Inside Out
Chapter 9: Configuring Internet Explorer
▶ Partner User Guide (Problem Solution)
Presentation transcript:

Chapter 9: Configuring Internet Explorer

Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing Pop-up blocker Add-on support Favorites center 2/11

Instant Search Quickly search selected search provider Change default search provider Create custom search provider 3/11

Configuring RSS Really Simple Syndication XML-based technology Subscribe to feeds Feed options –Automatically download attachments –Automatically update feeds 4/11

Configuring Add-ons Add-ons extend functionality of browser Created by third-parties May cause instability Enable or disable add-ons Internet Explorer (No Add-ons) 5/11

Pop-up Blocker Prevents pop-ups from being displayed Selectively enable pop-ups –Information Bar –Pop-up Blocker Settings dialog box 6/11

Internet Explorer Security Features Phishing Filter Improved privacy features Security Status Bar Parental controls Protected Mode 7/11

Phishing Filter Prevents malicious websites from masquerading as legitimate websites, such as PayPal, in order to get personal information Automatic website checking Report websites believed to be malicious 8/11

Parental Controls Monitor and restrict computer usage – Internet usage –application usage –enforce time-limits Configured only on standard user accounts Allow list 9/11

Protected Mode Isolated environment Prevents code from being run on system files, unless the user explicitly allows the access Configured on Security tab of Internet Properties dialog box 10/11

Internet Privacy Delete Browsing History –Temporary Internet Files –Cookies –History –Form data –Passwords 11/11