11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Configuring Windows Internet Explorer 7 Security Lesson 5.
Lesson 4: Web Browsing.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
The Internet 8th Edition Tutorial 1 Browser Basics.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Microsoft ® Official Course Module 9 Configuring Applications.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
Exploring Microsoft Office Welcome to Cyberspace: The Internet and World Wide Web1 Exploring the Internet Chapter 1 Welcome to Cyberspace: The Internet.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Chapter 21 Browsing the Web 1. What’s Inside and on the CD? In this chapter you will learn about: –The Web –Popular Web browsers –How to use a browser.
Module 5: Configuring Internet Explorer and Supporting Applications.
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
HTML, Third Edition--Illustrated Brief 1 HTML, Third Edition Illustrated Brief Unit A Creating an HTML Document.
Steps to clear the browser cache Internet Explorer 11 (IE11)
Exploring Microsoft Office Welcome to Cyberspace: The Internet and World Wide Web1 Exploring the Internet Chapter 1 Welcome to Cyberspace: The.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
Adding and Modifying Accounts in Microsoft ® Outlook Express ™, and modifying connection settings in Microsoft ® Internet Explorer ™.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
CHECKLIST SYSTEM REQUIREMENTS Done For Further Testing Browser Requirements Internet Explorer version 6.0 or 7.0 Testing of CIR (avg. minimum bandwidth)
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
+ CIW LESSON 4 Web Browsers. + Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Display Web pages properly Provide.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
1 Lesson 28 Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Tutorial 1 Getting Started with Adobe Dreamweaver CS5.
Tools/Internet Options: General Tab/Temporary Internet Files (Screenshot A): Clear out cache by clicking Delete Cookies button/Okay (Screenshot B) Clear.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 4 Installing and Configuring Applications.
Accessing the Intranet
Lesson 4: Web Browsing.
Browsing and Searching the Web
Unit 12 Using the Internet & Browsing the Web
Exploring the Internet Welcome to Cyberspace:
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
AUTOFILL FORMS. Open Internet explorer browser.
IS 4506 Server Configuration (HTTP Server)
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Lesson 4: Web Browsing.
Business Zone - Clearing your Cache
Chapter 9: Configuring Internet Explorer
Presentation transcript:

11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY2 OVERVIEW  Configure Internet connections in Internet Explorer  Connect to resources using Internet Explorer  Configure and manage Internet Explorer security settings  Configure and manage Internet Explorer privacy settings  Audit and control add-on programs and browser helper objects with Add-On Manager  Configure Internet connections in Internet Explorer  Connect to resources using Internet Explorer  Configure and manage Internet Explorer security settings  Configure and manage Internet Explorer privacy settings  Audit and control add-on programs and browser helper objects with Add-On Manager

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY3 MANAGING INTERNET EXPLORER CONNECTIONS  Using the New Connection Wizard  Dial-up  Broadband  Managing connection settings  Local area network (LAN)  Proxy  Using the New Connection Wizard  Dial-up  Broadband  Managing connection settings  Local area network (LAN)  Proxy

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY4 NEW CONNECTION WIZARD (DIAL-UP)

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY5 NEW CONNECTION WIZARD (BROADBAND)

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY6 CONFIGURING LAN AND PROXY SERVER CONNECTIONS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY7 CONNECTING TO INTERNET RESOURCES  Uniform Resource Locators (URLs)  Web site resources  Using FTP resources  Connecting to Web folders  Uniform Resource Locators (URLs)  Web site resources  Using FTP resources  Connecting to Web folders

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY8 UNIFORM RESOURCE LOCATORS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY9 WEB SITE RESOURCES  HTML documents  Active content  Streaming media  Web-based applications  HTML documents  Active content  Streaming media  Web-based applications

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY10 USING FTP

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY11 WEB FOLDERS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY12 INTERNET EXPLORER SECURITY  URL actions  Web content zones  Advanced security options  URL actions  Web content zones  Advanced security options

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY13 URL ACTIONS (SECURITY SETTINGS)

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY14 WEB CONTENT ZONES (SECURITY ZONES)  Restricted  Internet  Local Intranet  Trusted Sites  Locked-Down Local Machine  Local Machine  Restricted  Internet  Local Intranet  Trusted Sites  Locked-Down Local Machine  Local Machine

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY15 CONFIGURING ZONE SECURITY

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY16 POLICY–BASED SECURITY MANAGEMENT

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY17 ADVANCED SECURITY SETTINGS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY18 MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER  Cookies  Pop-Up Blocker  Internet caching  Browser history  AutoComplete  Password caching  Cookies  Pop-Up Blocker  Internet caching  Browser history  AutoComplete  Password caching

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY19 TYPES OF COOKIES  Persistent  Session  First-party  Third-party  Persistent  Session  First-party  Third-party

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY20 MANAGING COOKIES

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY21 BLOCKING POP-UPS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY22 MANAGING TEMPORARY INTERNET FILES

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY23 MANAGING BROWSER HISTORY

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY24 CLEARING BROWSER CACHE AND HISTORY

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY25 AUTOCOMPLETE

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY26 INTERNET EXPLORER PASSWORD CACHE

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY27 CONTROLLING ADD-ON PROGRAMS  Add-on programs and ActiveX controls extend Internet Explorer.  Browser helper objects (BHOs) control browser operation.  You can manage add-ons and BHOs with Add-On Manager.  Add-on programs and ActiveX controls extend Internet Explorer.  Browser helper objects (BHOs) control browser operation.  You can manage add-ons and BHOs with Add-On Manager.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY28 USING ADD-ON MANAGER

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY29 SUMMARY  Internet Explorer supports many Internet connection types.  Proxy and LAN settings might have to be set manually.  URLs help locate Internet content.  Internet Explorer uses Web content zones to define security.  Cookies are small files used to store preferences or personal data.  Internet Explorer supports many Internet connection types.  Proxy and LAN settings might have to be set manually.  URLs help locate Internet content.  Internet Explorer uses Web content zones to define security.  Cookies are small files used to store preferences or personal data.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY30 SUMMARY (CONTINUED)  The Temporary Internet Files folder caches Web pages to speed browsing.  Browser history and other data can be cleared to protect privacy.  You can use Add-On Manager to control add-ons and BHOs.  The Temporary Internet Files folder caches Web pages to speed browsing.  Browser history and other data can be cleared to protect privacy.  You can use Add-On Manager to control add-ons and BHOs.