Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Module 9: Configuring internet explorer. The following topics are covered in this module: Configuring security for internet explorer, configuring privacy for internet explorer, configuring connection settings for internet explorer. | Module 9: Configuring Internet Explorer Overview Configuring Security for Internet Explorer Configuring Privacy for Internet Explorer Configuring Connection Settings for Internet Explorer Lesson: Configuring Security for Internet Explorer Configuring Security Zones Configuring Security Settings Configuring Security Zones Local intranet zone: Assign a low security level to allow users to run active content Internet zone: Assign a higher security level to prevent users from running active content and downloading code Trusted sites zone. If there are specific sites that you trust, assign trust to individual URLs or entire domains Restricted sites zone. If there are specific sites on the Internet that contain potentially harmful Web content, assign the highest restrictions Configuring Security Settings Lesson: Configuring Privacy for Internet Explorer Privacy Settings Configuring Privacy Settings Using Certificates for Privacy and Security Configuring Pop-up Blocker Privacy Settings A Web site’s privacy policy provides details about the information the Web site collects Internet Explorer can display a Web site’s P3P privacy policies A cookie is a file created by an Internet site to store information on your computer Privacy settings can be configured to specify whether to allow cookies Configuring Privacy Settings Using Certificates for Privacy and Security A certificate is a statement verifying the identity of a person or the security of a Web site A personal certificate is a verification that you are who you say you are A Web site certificate states that a specific Web site is secure and genuine Configuring Pop-up Blocker Pop-up Blocker enables you to prevent most pop-up windows from appearing while you are using the Internet Configuring Pop-up Blocker enables you to: Enable or disable Pop-up Blocker View a pop-up that Internet Explorer has blocked View pop-ups from a specific Web site Remove sites from Web content zones that allow pop-ups Change which sites are . | Module 9: Configuring Internet Explorer Overview Configuring Security for Internet Explorer Configuring Privacy for Internet Explorer Configuring Connection Settings for Internet Explorer Lesson: Configuring Security for Internet Explorer Configuring Security Zones Configuring Security Settings Configuring Security Zones Local intranet zone: Assign a low security level to allow users to run active content Internet zone: Assign a higher security level to prevent users from running active content and downloading code Trusted sites zone. If there are specific sites that you trust, assign trust to individual URLs or entire domains Restricted sites zone. If there are specific sites on the Internet that contain potentially harmful Web content, assign the highest restrictions Configuring Security Settings Lesson: Configuring Privacy for Internet Explorer Privacy Settings Configuring Privacy Settings Using Certificates for Privacy and Security Configuring Pop-up Blocker Privacy Settings A Web