Where are the internet explorer settings. How can you configure the internet explorer browser and what is needed for this? Disabling Java scripting

  • Keys for starting the browser in Windows XP
  • According to most users, Internet Explorer is not the best browser, as it loads pages slowly, for the reason that it displays the page only when it has already been fully loaded. Nevertheless, this does not prevent it from remaining one of the most popular browsers in the world (but this is more likely for the reason that it is built into Windows and some programs can often depend on it).

    Installing Internet Explorer 8

    Browser installation is simple, even a beginner can handle it. Although, in fact, we are not installing the browser, but updating it. If you want to install Internet Explorer 8, then most likely you have an older version, for example Internet Explorer 6.

    I install programs through the Uninstall Tool and I advise you to do this too, you never know, suddenly you want to uninstall it later


    We choose whether we want to help or not and click the "Next" button.

    It's up to you to decide whether to install updates or not, I personally did not tick the box, since I can manually download updates from the official website.


    After installation, you will need to reboot. If you installed the browser through the Uninstall Tool, then you must refuse to reboot, otherwise the Uninstall Tool simply will not be able to save the data, because the reboot will start immediately. And after the Uninstall Tool has saved the data, reboot.

    After rebooting, you can already open the browser (via the start menu) and surf the Internet.

    Setting up Internet Explorer 8

    After installing the browser, when you first open it, there will be a dialog, so to speak, an assistant - you can choose your preferred settings or close the window, since all these parameters can be configured separately.

    The item in the control panel is responsible for configuring the Internet Explorer 8 browser, namely, Internet Options.

    So, let's go through some of the settings for Internet Explorer 8.

    How do I change the home page of Internet Explorer?

    Changing the home page is quite simple, you need to go to the "General" tab (in the Internet properties), and in the "Home page" field, enter the site that you would like the home page to be, but if you want no site to load when you open the browser then just type about: blank.

    In order for the changes to take effect, you must click the "apply" button.

    How do I delete items from Internet Explorer history?

    Sometimes it happens that after browsing Internet sites, you need to delete the history of these sites, that is, so that others do not know which sites you visited (for example, in the case when you chose a gift). This is not so difficult, and can be done in the same tab by clicking on the "Delete" button in the "Delete history" sub-item.

    Also, in the window that opens, put a checkmark on what you need to delete - for example, passwords, temporary files, deleting the browsing history.

    How do I disable Internet Explorer pictures?

    Suppose you have a slow Internet, or for some other reason you need to turn off pictures so that they are not shown and they do not use up the Internet (this is important when the traffic is limited or paid).

    We go to the tab (in the properties of the browser) on "Advanced" and a list of many items (checkmarks) opens before us, we need to find the sub-section "Multimedia" and uncheck the necessary checkboxes, personally I advise you to remove everything if you decide to turn off images.

    How do I change proxy settings in Internet Explorer?

    If you need to access the Internet through a proxy, as it happens at work, or if, for example, you want to use a third-party service, for example, the Toonel service, then you can specify a proxy server for Internet Explorer through which the browser will work.

    To change the browser proxy settings, go to the "Connections" tab in Internet Options and select either the connection that you are using to connect to the Internet, or click "Network Settings" in the "Configure Settings" sub-item local network"If you are using the Internet over a local network.

    After that, a window will appear in front of you, in which you must enter the settings. A proxy, as a rule, consists of an ip-address and port, which must be entered separately.

    Using Internet Explorer as your default browser

    It so happens that for some reason Internet Explorer is not the default browser. In any case, if you want to make the default browser in the system, then you need to go to the "Programs" tab (in the browser properties) and click on the "Use as default" button.

    InPrivate Private Mode in Internet Explorer 8

    The private mode is convenient when you need to leave no traces when browsing the Internet, it is especially convenient, for example, if you are not at home, visiting.

    When using InPrivate mode, there will be no browsing records in the security log, nor will any form data, cookies, and therefore passwords and logins be saved.

    How do I enable InProvate mode? It's very simple - you just need to execute the calvish combination (that is, hold down) Ctrl + Shift + P, after which a private window will open in front of you Internet Explorer-a.


    And all the tabs that you open in this window will also be private, which is quite convenient.

    Internet Explorer 8 launch keys

    Launching the browser from the ‘Launch program’ window

    Also IE browser (iexplore.exe process) can be launched with keys. To check this, you need to open the window ‘Launch the program’ with the combination of Win + R and enter ‘iexplore.exe’ (without quotes) in the window and if you have a browser open, you can start Internet Explorer with the keys.

    For example, let's start the browser without add-ons, for this we use the -extoff switch, that is, we must enter iexplore.exe -extoff.

    Launching the browser from the command line (console)

    Also, if you wish, you can launch the browser with the keys from the command line, but in this case you must specify the full path to the browser, an example of launching Internet Explorer from the command line with the "-nohome" key:

    "C: \\ Program Files \\ Internet Explorer \\ iexplore.exe" -nohome

    This line must be entered into the command line, you can call it using the key combination Win + R, and then enter cmd in the 'Start program' window.


    Keys for launching the Internet Explorer 8 browser (in Windows XP)

    Let's list the keys that can, if necessary, simplify the work with Internet Explorer.

    Iexplore.exe url, in this case the browser with the specified address will simply be opened, example is iexplore.exe /
    - iexplore.exe -extoff will allow you to launch the browser without add-ons
    - iexplore.exe -new this switch will start a new IE window in a separate process
    - iexplore.exe -nohome using this switch, the browser will start without any pages, which is interesting, it will start faster even when about: blank is specified as the home page
    - iexplore.exe -nomerge this key is used to start a new session, for example, to be simultaneously in two social network accounts at once
    - iexplore.exe -k will enable you to launch the browser in full screen (kiosk mode)
    - iexplore.exe -slf this key is used, as I understand it, to force the opening of the home page
    - iexplore.exe -embedding key will allow launching the IE browser object without visual displaying the page
    - iexplore.exe -private launch of the browser in private mode, quite a convenient key

    Well, that's all, I hope this material was useful for you

    I will not cover all 25 browsers in this article (today this is exactly how many can work with the operating windows system), I'll tell you about the most common ones. Many users mistakenly think that choosing a browser is a simple task and that they are all the same, that they are displayed the same on all pages of sites. In addition to such clear differences as appearance of the user interface and the program control system, there are also hidden differences in security, speed of loading and displaying pages, the presence of additional auxiliary functions. If we take a combination of these factors, then the differences can be serious.

    "Configure Google Chrome Browser"

    Along the way, the browser settings "Internet Mail.ru", "Comodo Dragon", "Yandex", "Nichrome" also get here. All of these browsers are powered by the Chromium engine. The settings and interfaces of these browsers are almost the same.

    Click on the "Settings and Management" button (the wrench in the right upper corner).

    We see context menu, with which you can view history, downloads, etc., but today we will focus on the settings. Click on the "Settings" line.


    In the settings window that opens, select "Basic".


    Now, in the tab that opens, we will see that we are prompted to choose which page we will see when the browser (browser) starts. I checked the Home Page.


    In the line of the window that opens, enter the page that we want to see when the browser starts - google, mail.ru, yandex.ru, webalta, etc. If you mark the "Page quick access", then by opening the browser you will be taken to the page on which the sites that you most often visit will be displayed.

    By clicking on the line "Search Engines Management" we can select the search that suits us, from the list of proposed ones. We decided to do Google chrome default browser, then click on the button "Set Google Chrome as default browser".

    By clicking the "Offer to save passwords" button, the browser will offer you to save the password when filling out the password field on the sites, when you re-enter this site, the browser will fill in the password itself.


    AT additional settings you will be able to set up spell check, translation of pages. You can also specify the path to save downloaded files - either by default, or in a folder you created, or on your desktop, etc. Surely by installing Google chrome before that, you used another browser in which you had bookmarks or favorites. You can import bookmarks and settings from another browser into Google Chrome by clicking the corresponding button in the settings.

    "Configure Internet Explorer browser (at least IE 9, at least IE 10)"

    Click on the "Settings" button (gear in the upper right corner).


    Click on the line "Internet Options" in IE 9, or "Internet Options" in IE 10.


    We see the "Properties" window that opens, on the "General" tab you can enter the address of the page (pages) that you want to assign home.

    On the "Security" tab, set the security level that will be used when visiting sites - "Medium", "Above average", "High". Do not set a high level, otherwise it will block everything in a row, put “Above Average”.

    In the process of internet explorer work, you can create a shortcut to the site you like and place it on your desktop windows table... To do this, right-click on the site page and select the "Create shortcut" tab.

    On the privacy tab, you can also adjust the parameters that suit you by setting the slider to the desired position. Then "Apply", "OK".

    On the Programs tab, you can set IE as your default browser. Install add-ons. Assign programs to work with e-mail.

    By going to the "Manage add-ons" tab, you can enable or disable plugins and toolbars launched together with the browser. The more enabled, the longer it takes to launch the browser. Therefore, leave only the most necessary for you.


    AT command line on the "Security" tab, you can enable the "SmartSreen" filter to safely open Internet pages. You can turn on Tracking Protection and clear your browser history.


    By clicking right click mouse on an empty spot at the very top of the browser, you can enable or disable the add-ons you need. I was joking about Webalta! Just the other day with one program I caught it on the computer. I cleaned it up everywhere, read how to remove toolbars in this article. I didn’t know that I have it until I began to remove the "screenshots" for the article.

    You can drag any sites and search engines from the "Favorites" to the "Favorites bar". I have dragged and dropped the search engines I use more often.


    Clicking on the triangle in address bar you will see the addresses of the last sites you visited, the journal and favorites. You can go directly there by clicking on the desired line.


    I use Mozilla Firefox 19 and IE 10. Firefox takes much longer to load than IE on startup, but it works stably when loaded, very rarely crashes, and IE crashes. I love Firefox for the huge number of add-ons and extensions, no other browser has that much. The settings are very simple. My friends, if you use Windows OS, then I do not recommend you to assign any default browser other than Internet Explorer. And even more so, God forbid, remove him. I wrote this for those who want to use all the functions of a PC. Too much in Windows is connected with IE, you can not use it, but do not dare to eliminate! IE 10 settings are simple, almost no different from IE 9. Now, in addition to Win 7, I also have Win 8 on my computer, IE 10 was immediately integrated into Windows 8.

    "Configure Mozilla Firefox Browser"

    Mozilla Firefox 15, 16, (17 did not forget but did not see the version in Russian), 18, 19 is several times faster than previous versions. FROM increased speed startup, faster page load times, improved web application performance, and the inclusion of hardware graphics acceleration, Firefox is optimal for complex, interactive websites.


    To open the settings, click on this triangle.


    The home page is easily customizable, in the same window you can specify the path for saving files. It is convenient for me to download to the desktop.


    You can always see the download speed of files.


    Firefox Sync: Access history, bookmarks, open tabs, passwords, smart address bar, and form data from multiple computers. Flexibility in customization. Of particular note in the browser is the concept of extensions and add-ons.

    The essence of the idea is that the browser itself in its "pure form" provides only the basis - the address bar, tabs, program menu. Nothing special, nothing superfluous. If the user is satisfied with this, you can not bother with all sorts of additions. But I think it will suit you only until the moment when you try to install the first add-on.

    New Add-on Manager: Choose from over 200,000 add-ons to help you customize the features, functionality and look of Firefox. Mozilla Firefox is the most extensible and highly customizable browser on the planet. You can customize toolbars, install additional plugins and themes.

    Like a telescopic fishing rod, Mozilla Firefox can transform from a small, compact browser to an amazingly versatile travel tool. worldwide network... You can also learn more about what Firefox extensions can do by watching the videos. Privacy and security.


    Browser privacy and security. Tracking Ban: Firefox is leading the way to implement a universal standard for Tracking Tracking, allowing users to tell sites they don't want sites to track their behavior and use it to serve ads. Firefox puts privacy first, fixing flaws in some web standards, thereby eliminating the ability of others to access your browser history.


    HTTP Strict Transport Security (HSTS): Automatically establishes a secure connection to prevent man-in-the-middle attacks and interception of sensitive data during the login process. Content Protection Policy (CSP): Prevents cross-site scripting attacks by allowing sites to tell the browser what content is legitimate.

    With Firefox, you are free from various spywareas well as from ActiveX controls. You can independently control your privacy, flexibly manage your personal data. The browser allows you to instantly remove traces of your online presence. The JavaScript engine makes pages load faster and improves the performance of games and web applications.

    Firefox includes hardware acceleration, high-definition video (WebM), 3D graphics, offline data storage, professional typography, Mozilla's audio API to help create visual effects from sound, and more. Firefox includes a built-in error notification console for web pages and a web developer console. Additional extensions like Firebug make it easy to develop and debug web pages.

    Firefox keeps working even if it crashes adobe plugins Flash, Apple QuickTime, or Microsoft Silverlight... If one of these plugins crashes or freezes, it will not affect the rest of Firefox. Just refresh the page to reload the plugin.


    Adding sites to bookmarks, thanks to the asterisk in the address bar, is now possible with one click. Management of the magazine and bookmarks is unified and carried out within a single dialog box. The selection of the necessary links has become more convenient, due to the presence of special groups of recently added bookmarks and the most frequently visited sites. Smart address entry line As soon as you start entering the address, a prompt window appears, where all matches are shown in bold.


    Intelligent address entry line. The window contains a list of previously visited sites. The string responds not only to site addresses, but also to their headers, which greatly simplifies and speeds up input. They are displayed in a window with a history of previously opened sites. Even if you don't remember the exact address, the name of the resource will tell you the right way.


    Automatic updates You no longer need to manually download new versions of the browser as they are released. The update system automatically downloads small patches of several hundred kilobytes, saving you time. I started off with Mozilla Firefox 13, but today I already use Firefox 19, that is, it updated itself to version 19.

    Optimal base composition A simple, intuitive browser has everything you need to everyday life... Bookmarks, magazine, full screen mode, text scaling and much more - it's all in Mozilla Firefox. Pop-up Blocker You will no longer be annoyed by pop-ups that open when you visit many sites. You can independently specify from which sites to allow the opening of pop-up windows, and from which not. Read emails without spam Mail client Mozilla Thunderbird is a great add-on for Firefox. With MozBackup, you can back up your Firefox profile data or restore data from a Firefox profile backup. You can save and restore data such as settings, bookmarks, history, extensions, passwords, cookies, saved forms, download list, certificates and styles.

    Applications. Viewing Flash animations, executing Java applets and much more is possible with plugins for Mozilla Firefox. Search plugins from Mozilla.org With search plugins you can add to Firefox search on popular sites. Search plugins from the Mozilla Russia site With the help of search plugins, you can add search to popular Russian sites in Firefox. Dictionaries from Mozilla.org Dictionaries to check spelling in Firefox. Dictionaries from the Mozilla Russia website.



    "Configure Opera Browser"

    If you do not like the default browser setting, then I will describe how to set up Opera, but only the basics. In Opera, we have three options for settings: Settings (Ctrl + F12), Quick setup (F12) and decoration (Shift + F12). Remember these keys. The settings are opened by pressing the red "Menu" button in the upper left corner, and then selecting the "Settings - General" items.


    On the "Forms" tab it will be useful to fill in some information about yourself. This can be convenient, namely, it allows you to reduce the time it takes to fill out typical forms on some sites.


    On the "Search" tab you can edit the list of used search engines that switch in the upper right corner of the browser. Decide to your taste what you need and what not.


    You don't really need to change anything on the Web Pages tab. Unless, if you have a slow connection, you can turn on the turbo mode and turn off pictures, or show only cached images.


    Let's move on to advanced settings. In the subsection "Tabs" we customize everything to our taste. Personally, I just turned off the sketches that were unnecessary, in my opinion.

    In the "Notifications" subsection, perhaps it is worth turning off the sound, personally, I unchecked "Show notifications from Opera Unite applications", because I don't use this service.


    In the "Navigation" subsection, set the page redrawing "Continuously" and set a check mark on the "Show full web address in the address field" option. The rest, I think, is at your discretion.

    Further subsection "History". It is important to decide on the size of the cache, both in memory and on disk. It is needed to quickly display a page that you have already visited (that is, without reloading it from the Internet, by means of a copy saved on disk, in memory). The larger the cache, the more pages it will save. If fast loading of already visited sites is not important for you, then you can safely set zeros for both parameters (Cache in memory and Disk cache, respectively). If this is important to you, then I recommend setting the maximum allowable value (400 Mb) both here and there (if the RAM is running out, you can rely on disk cacheby disabling the cache random access memory). I set the time for checking for updates on the server "Every hour", although this value could be set even more.


    In the "Security" subsection, check the "Enable protection against fraud and malware", and on the "Security protocols" tab, check all the available items.


    On the "Network" tab in the "Number of connections to the server" and "Total number of connections" items, set 32 \u200b\u200band 128, respectively. Owners of weak internet connections may have to go back to the recommended settings (16 and 64).


    Useful extensions for opera browser... Blocking ads and scripts. With Orera11, as well as in FF and Google Chrome, there is a list of extensions that can be installed, giving the browser new capabilities. Today I will touch on two extensions that everyone needs (they are responsible for the safety and comfort of being on the Internet) - NotScripts (analogue of Noscript for Firefox) and Opera Adblock (analogue of Adblocks Plus).

    NotScripts.

    It deals with the fact that prevents the execution of scripts on the page, if you did not allow this yourself with your handles. The fact is that JavaScript is one of the sources of various infections from the Internet, therefore blocking and controlling its execution is one of the key elements of security. More details on this on the plugin page.

    You can install the plugin by going to the page with it by clicking the "Install" button. After installation, the plugin triangle will appear in the upper right corner. Click on it with the mouse and see a small message that you need to do this and this for the plugin to work. Now we click the mouse on it and see the opened page with settings in front of us.

    That is, if you are currently on sonikelf.ru, then if something does not work, then you allow the sonikelf.ru script, not mail.ru. After that, you carefully look - didn’t it work what you needed? If the answer is yes and everything works as you would like, then you don't touch anything else. If not, then you carefully look at what scripts are still there and choose one more from them, allowing it. And so on until the full performance of what you need. Try to avoid allowing scripts that have names other than this site. Googlecode, yandex, etc. are usually safe scripts.

    Adblock.

    It is installed in the same way (Install button). After installation, go to "Menu - Extensions - Manage extensions" and in the Adblock line, click on the gear image and, from the drop-down menu, select "Settings".

    In the settings, on the "Subscriptions" tab, we need to set two checkboxes "Russian" in the FanBoy and EasyList lists. On the "Button" tab, check the "Display the button in Opera address bar" checkbox.

    This will enable the display of the plug-in button near the address bar. To customize the personalization of Opera, you should start with the design, it is there that the necessary buttons are located. Press Shift + F12, immediately go to the Toolbars tab and check the Show box below hidden panels when setting up. Now we see all the panels at once.

    We proceed as follows: click on the desired panel, and then set the parameters in the sliding fields (at the bottom, top, hide, show, the location of icons, etc.) Next, set up the navigation - it is much easier here: the Buttons panel, the left menu is the Browser. Take any button and drag it to the control panel. The most necessary buttons are back, forward, home, update, start, create, passwords (if necessary).

    You can also customize Opera by pressing Ctrl + F12. This is where the home page, password management is configured. You can also drag the search form of any system to the desired panel. Here, other parameters are also more finely configured: managing cookies, java script, content, blocking sites (see. parental control), and even voice control. How to disable torrent in opera.

    Or maybe you won't turn it off? I don't use Opera now, BitTorrent had to be installed in a separate program. Don't know how to use Torrent? The administrator of this site told me, in confidence, that he will soon publish an article about Torrent settings. Well, if you don't want to download an opera from a torrent? Instructions for disabling the torrent in the opera, although ... We climb into the configurator: in the address bar, write opera: config and press enter.

    Opera torrent, used by default. In the Bit Torrent parameter, uncheck the Enable box, click "Save" below. Now "Opera 9" will be silent about the torrent, and Opera 10 and 11 will offer you to choose yourself or use your program, but will not download without demand. But first, just in case, save the settings file C: \\ Documents and Settings \\ admin \\ Application Data \\ Opera \\ Opera \\ profile \\ opera6.ini If you are wrong, you can easily put everything back in place.

    That seems to be all, I did not describe the settings in detail, but I tried to cover those that will be needed immediately after installing the browser. Good luck to all! See you on the site pages.

    The main purpose of the browser is to view Web pages. Even a small program that takes only a few tens of kilobytes can cope with this task. The first browsers were like that. However, during the fierce competition that erupted between the leading programs Netscape Navigator and Microsoft Internet Explorer, both programs have acquired a lot of additional customizable features. In particular, Internet Explorer, emerging from the battle as a winner, turned into a huge software package that allows you to customize the program to the individual requirements of the most biased user. In this article, we will cover most of the settings that are present in the sixth version of Internet Explorer. These settings allow you to change the program interface, add the necessary panels and buttons, change the display parameters of the requested pages. This article discusses how to customize various view modes, including disabling graphics, changing the font size, changing the color and encoding of the text of the pages being viewed. From this article, you will also learn how to configure the required privacy and security mode, how to operate with certificates, how to select the size of the folder for storing temporary Internet files, determine the connection to a particular proxy server, and much more.

    Toolbar customization

    first of all, let's turn to the point View a control menu that provides access to the most frequently used settings.

    On the menu View you can add and remove panels as you wish (fig. 1).

    In order to add or remove buttons on standard toolbars, change their size and arrangement, run the command Toolbars à Setting,as a result, a panel will appear (Fig. 2) where you can change the icons.

    On the menu View you can also customize the different browser panes: Search, Favorites, etc. (fig. 3).

    Typically, the developers of a Web site determine the size and type of fonts on the page. However, these parameters may not be optimal for you. You can set your own text display mode in the browser settings. For this in the menu View point the mouse cursor to Font size and select the size you want (fig. 4).

    You've probably come across a situation where, instead of the text of the page, the browser displays a set of unreadable sequence of characters. In this case, you should check if your browser has selected the correct encoding for this page. Cyrillic (KOI8-R) and Cyrillic (Windows) encodings are often confused.

    Most Web pages contain information from which the browser can set the required language encoding.

    If there is no such information on the web page, and Internet Explorer is configured with the automatic selection function, then the encoding will be selected automatically.

    In order to enable the function of automatic selection of encoding, it is necessary in the menu View Internet Explorer (Fig. 5), check the box Auto select.

    If using autoselection it was not possible to determine the correct language encoding, but it is known which encoding is needed in a particular case, you can select it manually using the command Additionally.

    General Tab

    in the tab General (Fig. 6) you can define the so-called "Home page", that is, the page from which you will start browsing Web-resources.

    Temporary Internet Files

    as you know, to speed up the viewing of pages that you have already visited, they are cached on your computer's hard drive and certain time stored in the Temporary Internet Files folder. This storage arrangement speeds up the display of frequently visited Web pages because the browser can open them from your hard drive rather than requesting them again from the Internet.

    To see what resources are available directly from your computer, open the folder Favorites, run the command File à Work offline and pay attention to your panel Favorites.Site names that are not available in offline, will turn gray, and those whose information is cached on the hard disk will be highlighted in black (Figure 7).

    Obviously, the more space you provide on your computer for cached pages, the more likely it is that the newly requested information will be saved on your disk. In order to increase the Internet cache, go to the tab General to section Temporary Internet Files and select item Parameters, as a result of which the panel of the same name will appear (Fig. 8), in which you can configure the value of the maximum allowable folder size for storing temporary Internet files.

    Increasing the space reserved for the folder storing temporary files may increase the likelihood of previously viewed Web pages being cached on your computer, but this obviously reduces the amount of free disk space.

    In the next screen of the wizard (Fig. 10), you can set the mode in which the subscription will also occur to those pages to which the base pages will link. And you can set the depth of the links.

    Next, you will be prompted to select a method for synchronizing the page (Figure 11). There are two options: by the "synchronize" command or by using a new schedule.

    If you choose the "new schedule" mode, the Wizard prompts you to define the synchronization frequency and specify the synchronization time (for example, every day at 23:00).

    Privacy Tab

    Internet Explorer protects the user's privacy and the security of their personal identification information.

    Internet Explorer privacy tools include:

    • security settings that determine how cookies are handled;
    • privacy Alerts informing you that the Web site you are opening does not match your selected privacy settings.
    • the ability to view the privacy policy of the P3P Web site (Platform for Privacy Preferences Project, P3P.

    Due to the support of RZR, servers that collect information about visitors (primarily online stores) and ignore this format may be blocked.

    The category of confidential information protected by P3P includes the user's personal data: his real name, e-mail address, etc. Protected information is also information about the web resources visited, recorded in cookies.

    To ensure compatibility with the P3P protocol, a web resource must describe its privacy policy, that is, determine what information about users it records, how it stores it and what cookies it creates. This description is formalized in accordance with the P3P specification and placed in the root directory of the site. Internet Explorer reads this file and receives the necessary information.

    The main channels for leakage of confidential information are third sites (they are also called third-party sites), that is, sites to which the user addresses in parallel with the site being viewed. Any Web site that does not appear in a browser window is called a third party. The Web site you are browsing may contain content from third-party Web sites, which in turn may use cookies.

    In Internet Explorer 6.0, the default security level is to block cookies from third-party sites that:

    • incompatible with P3P, that is, they did not declare their privacy policy;
    • request personal information without the explicit consent of the user;
    • request personal information without the user's implicit consent.

    To change privacy settings, in the tab Confidentiality move the slider up to increase the level of protection and down to set a lower level of protection (Fig. 14). The description of adjustable modes is given in the table.

    It should be noted that changing the privacy mode does not affect the cookies already stored on the computer.

    By pressing the button Additionally on the panel (Figure 14), you will be taken to a panel where you can define additional privacy settings: override automatic processing of cookies and define the mode of accepting primary and third-party cookies (Figure 15).

    Security tab

    Internet Explorer divides the Internet into zones of different security levels, which allows you to assign the required level of protection to each Web site.

    Local intranet (Local Zone)

    Typically, this zone contains all addresses that do not require a proxy server to access. The default security level for the local intranet zone is Medium. Thus, Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites on which they were created.

    Internet Explorer's privacy settings let you control how cookies are handled for all Web sites or for each Web site individually.

    Reliable nodes

    The Trusted Sites zone is set to low security by default. Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites on which they were created.

    Restricted nodes

    For this zone, the default is high level security. Internet Explorer will block all cookies from Web sites in this zone.

    Contents Tab

    Access limitation

    If you use a computer at home and are afraid that your children may view those pages that you want to restrict access to, you can use the settings located on the tab Content on the panel Internet options (fig. 19).

    You can restrict access to thematic groups of sites or set a strict ban on access to specific sites.

    It is quite difficult to protect a child from visiting all sites of a certain subject, but if you have information about specific sites to which you want to block access, it is naturally much easier to do this. For example, in the tab Allowed nodes you can specify a list of sites prohibited from viewing (fig. 20).

    Authentication problem

    Authentication is the foundation of communication security. Users must be able to prove that they are who they say they are, and at the same time must be sure that their correspondents, in turn, do not impersonate someone else. It is more difficult to do this online than in real life, primarily because we, as a rule, cannot meet in person with a partner providing a particular online service. However, even when you see your partner, the problem of identification does not disappear - which is why there are passports, driver's licenses, etc. To authenticate partners on the Web, you must have the appropriate certificates. Before talking about the settings, let's recall the purpose of the certificates.

    Certificates

    A certificate is a document that identifies the owner or security of a Web site. It is a set of data that allows you to identify a correspondent. Certificates are used to protect personal identity on the Internet and to protect your computer from unsafe software.

    An organization with a high trust status can issue certificates that allow the public key to be associated with the identity of its owner. Such an organization is called a Certification Authority (CA), or certification authority.

    Internet Explorer uses two types of certificates: personal certificates and Web site certificates.

    A personal certificate is used to verify the identity of a user who accesses a Web site that requires a certificate. A Web site's certificate validates its identity to those clients who request a service from it.

    A Web site "identity" certificate is required, for example, when sending confidential information over the Internet to a Web site or downloading software from the Web site.

    The core of authentication is public key encryption. The certificate maps an identifier to a public key. The corresponding private key is known only to the owner of the certificate, who uses it to digitally sign or decrypt the data encrypted with the corresponding public key.

    The digital signature specified in the certificate is the electronic identification of the user, which informs the recipient that this information really came from a specific correspondent and was not changed at the delivery stage. When a user accesses a secure Web site, the latter will automatically send the user its certificate. As a result, the user will receive a notification that the connection is secure and the data transmitted by the user will not be available to third parties (Fig. 21), while when requesting more detailed information from the IE browser, it will explain the mode of visiting the protected site (Fig. 22) ...

    To be able to send encrypted or digitally signed messages yourself, the user needs to obtain a personal certificate and configure Internet Explorer to work with it.

    Checking Web Site Certificate When Downloading Software

    There may be several situations when it is important for you to know that the server with which you are going to exchange data belongs to exactly the company to which it considers itself. Let's take a common example - buying or downloading free software from the Internet.

    When you buy boxed software in a regular (non-electronic) store, you receive a sealed box with the product, so you can track if the packaging is not broken, and in most cases you have no doubt who produced the software product. Another thing is when you download a product from the web. In this case, you do not know whether the supplier of this software is exactly who it claims to be, and the downloaded software does not contain viruses, is complete, reliable, etc.

    This problem can be solved by introducing an authentication code (Authenticode) into the distributed product. This technology enables software developers to digitally sign software developers to include information about the developer in the software they distribute. When users download software that is signed with an authentication code and certified by a CA, they can be confident that they are receiving the software from the company that signed it and that the software has not been changed after signing.

    Such a system is the basis for protecting consumer rights, for example, in case of viruses in the code. Based on code authentication, users can securely receive signed ActiveX controls, signed Java applets, and other applications.

    Software developers are also interested in authenticating a Web-based product, as this makes it difficult to counterfeit their software.

    Any company wishing to distribute software or content over the Internet needs such a system.

    Client microsoft programssuch as Internet Explorer, Exchange, Outlook, Outlook Express, come with security systems that already include an authentication system for code downloaded over the Web. This is necessary primarily because the above-mentioned systems are designed for replenishment from the Net. According to the component model, elements such as ActiveX or Java applets can be downloaded to your computer when you browse a Web site. When a user visits a Web page that needs to play an animation or sound, program code often loaded onto a client machine to implement a desired function. In this case, the user runs the risk of downloading a virus or other unsafe code. In order to secure the user, a system of signed applications exists.

    If a user of the above client applications encounters an unsigned component, the following will happen:

    • if the security system of the application is configured for the "High security" mode - the client application will refuse to download the code;
    • if the application security system is configured for the "Medium security" mode, the client application will issue a warning (Fig. 23);
    • if, on the contrary, the user encounters a signed applet, the client program will display another message (Fig. 24).

    Having received confirmation of the authenticity of the downloaded software, the user understands that, firstly, the software that he is going to download really belongs to the publisher, and secondly, he knows that authentication was provided by such and such a center, and represents where to get additional information in order of authentication. In this session, users can trust the further download procedure. Users can also select the "Always trust download from this publisher" command to speed up the verification process in the future.

    Users can always get additional information about the certificate (Fig. 25).

    Installing Publisher Certificates

    Certificate issuers create for themselves special, so-called root, certificates that confirm the authenticity of their private keys. Each particular type of certificate has its own root certificate: one for e-mail certificates, one for full personal certificates, and one for servers. Usually browsers come with a set of these certificates.

    If, while browsing the Internet, you come across a server with a certificate issued by an unknown publisher, you will be prompted to accept this certificate and, if it contains the root certificate of the same issuer, you will be offered the opportunity to install this certificate and assign actions to servers with certificates received from given publisher.

    Using digital certificates can ensure the security of your online transactions because it allows you to associate the identity of the certificate holder with a pair of keys (public and private).

    Obtaining a personal certificate

    So far, we've talked about the need for servers to prove their authenticity. However, in some cases, servers require confirmation of the client's identity. Therefore, now we will talk about personal certificates... There are several categories of reliability for certificates issued by independent certification authorities.

    Personal certificates are used to verify the identity of a user at the request of some sites that provide a particular service. Certificates are issued by the same certificate issuers, that is, a third party trusted by both the user and the service operator.

    To obtain a certificate, you must register with the certificate issuer of your choice.

    Usually, to obtain a certificate, you need to provide the issuer of certificates by mail, and sometimes personally, certain documents, and then pay for the certificate.

    The procedure for obtaining a certificate is as follows: you go to the certificate issuer's Web server, fill in the information required to obtain a specific certificate, and select the length of the private key (preferably at least 1024 bits). Before submitting the form, your browser will generate a public (public) and private (private) key pair and enter them into a password-protected database. The private key is known only to you - it should not be known to anyone else, including the certification authority. On the contrary, the public key is sent along with other entered data to the CA for inclusion in the certificate. It is impossible to determine the pair of the public key - the private key.

    After issuing a certificate, the certification authority usually sends you a certificate or specifies a URL where you can download it. After downloading the certificate from the certificate issuer, the browser automatically starts the installation procedure.

    Installing and removing certificates

    Internet Explorer has a certificate manager - Internet Explorer Certificate Manager (Figure 26).

    It allows you to install and remove client certificates and certificates of certification authorities, or, as they are also called, CA (from the English Center Authority). Many CAs already have root certificates preinstalled in Internet Explorer. You can choose any of these pre-installed certificates for code authentication, time stamped documents, secure mail, etc. To install or remove certificates, go to the tab Content... Select item Certificatesand then the corresponding tab. The following tabs are available: Personal, Other Users, Intermediate Certification Authorities, Trusted Root Certification Authorities, etc.

    Certificates in category Personal have matching private keys. Information signed by means of personal certificates is identified by the user's private key. By default, Internet Explorer places all certificates that identify a user (using a private key) into a category Personal.

    In the tab Trusted Root Certification Authoritiesusually, root certificates are already preinstalled, which you can view and get all information about them: by whom they were issued, their validity period, etc. (fig. 27).

    By clicking on one of the certificates, you can get additional information about it, including the composition and the certification path (Fig. 28).

    Setting up a proxy server in Internet Explorer

    As you know, modern browsers such as Internet Explorer and Netscape Navigator have internal cache settings that allow you to determine the amount of disk space on your machine that will be used to cache documents you have already viewed. The browser periodically refreshes the documents in the cache to keep them fresh. However, the amount of cache on a PC is usually small, because PC users rarely allocate more than a gigabyte of disk space for caching, so the amount of stored documents is small. It is difficult to allocate a large amount of memory on a local computer, but this can be done on the provider's proxy server - a computer running a special program that caches data requested by all clients of a given provider. Large providers can allocate tens or even hundreds of gigabytes to their customers. Some users fear, however, that using cached documents from a proxy server, they will receive outdated documents, but there is a technology to avoid this.

    There are a number of criteria by which a decision on caching on a proxy server is made. For example, if an object is marked as confidential, then it will not be cached. Similarly, there are criteria by which a decision is made about the possibility of sending a cached document to a client's request. For example, if a document has passed the expiration date, the server will not send it to the client, but will request a fresh document. Thus, fresh documents (not expired) are provided immediately, and if the proxy server is in doubt that the document is fresh, it can ask the Web server if the document has changed. It is possible that the expired document is not actually out of date because it has not been updated, in which case the Web server will respond to the proxy server that the document has not yet been "corrupted" and can be submitted to a client request. In other words, there is every reason to use a proxy server.

    To set up a connection through a proxy server, go to the tab Connections on the panel Internet Options (fig. 32) and instead of paragraph Never use (which you probably had configured if you weren't working through a proxy) select Always use the default connection.

    Then refer to item Customization, which will lead to the appearance of the panel shown in Fig. 32.

    Check the box Use a proxy server for this connection and enter the proxy server address and port - these addresses should be obtained from your ISP. I use the services of Zenon and in my case it is proxy.aha.ru. Then go to item Additionally (fig. 33) and indicate One proxy for all protocols.

    It should be noted that work through a proxy server is not always optimal. The most obvious example is if you have faster access to some Web server than to a proxy server, then there is no point in accessing a proxy server. Or, for example, if you are debugging Java applets on some server and you need to constantly watch how your software works correctly, then, of course, you will not be satisfied with downloading previous version applet. The panel shown in Fig. 33 Additionally, Play video,as a result, pages will load faster.

    After you have removed the display of images and loaded the page, it will be displayed in a "trimmed" form, as shown in fig. 37. There will be icons instead of pictures. By right-clicking on such an icon, you can call the context menu and view the required picture.

    ComputerPress 11 "2002

    And others malware, properly configured browser with the necessary add-ons and plugins installed. One of the best protection against all kinds of spyware is the latest version of the browser installed, such as Internet Explorer 11.

    To protect the IE browser, it is advisable to disable unnecessary (or not used) browser settings, possibly vulnerable to external attacks. For advanced security settings, follow these steps:

    Turn on pop-up blockers on websites you don't know. This security function allows you to select the desired blocking level. When you visit websites, you will receive pop-up blocking messages. You can also create a list of sites in advance where pop-up windows will not be blocked.


    Sites on your list will display pop-ups as usual. To enable pop-up blocking, click on the "Tools" button, and select "Browser options". Next, the "Privacy" tab, the "Pop-up blocking" section, where check the "Enable pop-up blocking" box and agree to the changes with the OK button.


    Please note that this feature will not block pop-ups from websites within your local intranet or your trusted sites.

    To block absolutely all pop-up windows, move the security level slider up. In addition to the default "Medium" regime, there are three more high degrees protection.

    Protected mode.

    Another browser protection setting is Protected Mode. This feature will help prevent malware from running in your browser. To enable Protected Mode, again, click the "Tools" icon, "Internet Options". On the Security tab, select the Enable Protected Mode check box and click OK.


    Protected Mode is configured separately for all zones: Internet, Local Intranet, Trusted Sites, and Dangerous Sites.

    Disable ActiveX.

    Internet Explorer's security has been dramatically improved by disabling ActiveX, active scripting, and Java. But, in this case, verified sites that also use these functions will not be able to load properly. Add them to your trusted list. To set Internet Explorer to the highest security level, move the slider all the way up and accept the changes with OK.

    How to enable ActiveX for verified sites.

    Click the "Tools" button, go to the "Security" option and check the box "ActiveX Filtering". Now, when visiting a web page with ActiveX controls, Internet Explorer will block them. The ActiveX filtering icon is displayed in the browser address bar. Clicking on the icon will enable ActiveX for that particular web page.

    Disable Java scripting.

    Java scripting creates interactive web pages, but is also an open gateway for malware. Include Java scripts only for trusted websites. To disable them - the "Security" tab. Click the Custom button and scroll down to the Run Scripts ... Java heading.

    If your browser is slow, it doesn't have to be a bad internet connection. Third party toolbars, some add-ons, cookies, or suboptimal customization options may also prevent high performance browser.

    Here are some simple steps you can take to optimize your Internet Explorer browser:

    More ideas that might be helpful:

    Removing toolbars

    Many toolbars downloaded and embedded in a browser affect not only its appearance, but also slow down the movement of Internet traffic.

    The browser toolbar is an add-on (extension) added to its interface. While some browser add-ons can enhance your online experience and can be very useful, others have negative consequences. They can easily set themselves to "default" status when bundled with widely available free applications, and they sometimes interfere with or conflict with other software on the computer.

    Each toolbar carries its own specialized functions, such as search functions, emoji, music player, and so on, so they require additional resources to work.

    In order to remove some of the toolbars, you will need to open the list installed programs (in Windows 7, click Start (Start)\u003e Control Panel (Control Panel) and under Programs(Programs) click Removing a program (“Uninstall a program”) - uninstall programs that you never use).

    Right-click each toolbar in the list that you would like to remove and select Delete(Uninstall). After you complete this process, the toolbars will be completely removed.

    Disable toolbars and add-ons right in the browser

    2. Click the button Service(in the form of a gear) in the upper right part of the window, then select Configure add-ins (Manage add-ons).

    3. Under the inscription Display(Show) select All add-ons (“All add-ons”).

    4. Select each add-on you want to disable and click Disable (Disable).

    5. When you're done, close the window and restart your browser.

    Delete cookies and clear browser cache

    Few people remember to do this, and in the end hDD turns out to be overwhelmed with a large amount of data stored by the browser for years.

    To clear your browser cache:

    1. Open Internet Explorer.

    2. Click the button Service(Tools), hover over the item Safety (Safety) and select Delete browser history (Delete browsing history). If you do not want to delete the cookies and files of the websites in the favorites list, select the checkbox Save data of selected websites (Preserve Favorites website data).

    3. Check the boxes next to the types of data that you want to delete.

    4. Click Delete (Delete).

    Reset browser settings

    Sometimes, when you install a program, it can change your browser settings without your knowledge. You may notice that your browser is behaving strangely.

    If Internet Explorer stops responding to commands or works in general, if you encounter error messages saying that Internet Explorer will close, or if you experience a noticeable slowdown, you might want to reset your Internet Explorer settings. To do this, follow the steps below.

    1. Start Internet Explorer.

    2. Click the button Service(Tools), then select Browser properties (Internet Options).

    3. In the window Browser properties (Internet Options) click the tab Additionally(Advanced).

    4. Click Reset(Reset).

    5. In dialogue Reset parameters customization Internet Explorerclick Reset
    Check the box Delete personal settings (Delete personal settings) only if you want to delete the browsing history, search service settings, Accelerators, home pages, Tracking protection and ActiveX Filtering data along the way. By checking this box, you are essentially launching a fresh version of Internet Explorer.

    6. When Internet Explorer finishes switching to default settings, click Close (Close), and then OK.

    7. Close Internet Explorer and restart it.

    Installing a new version of Internet Explorer

    Go to latest version Internet Explorer will make Internet access faster. In addition, your computer will be safer and it is very likely that the problems you have with your old browser will go away.

    Using the table below, you can find out what the latest version of Internet Explorer you can use in relation to the one you are using. operating system:

    To get the latest version of Internet Explorer, follow this link.

    Switching to another browser

    There are many internet browsers out there, each slightly different from the others. Some browsers have a lot of features, others are quite simple in this sense. Some perform slightly better than others. But all internet browsers basically do the same thing: they allow us to browse websites.

    The most popular browsers are Google Chrome, Mozilla Firefox, Internet Explorer, Safari and Opera. There are also other less popular browsers like RockMelt. Avant Browser, Maxthon, Deepnet Explorer, Flock, SeaMonkey, AOL Explorer, etc.

    Switching from one browser to another is in most cases the fastest and easiest way to fix many of the problems we face. If your browser is cluttered with toolbars and plugins, doesn't open some websites, or takes too long to load content, you can try installing a different one and see if it works better.

    To install a new internet browser, you will need to use the one you already have in order to find and download another. Just use search enginesuch as Google or Bing to find the browser you want to install and click the download link.

    Here are the pages on our site for the most popular browsers that you can use instead of Internet Explorer:

    You may also find a guide on how to optimize your Internet speed and performance when using Chrome and Firefox for help.

    Based on materials from the Internet portal. Translation into Russian: Alexander Ryabov