SlideShare une entreprise Scribd logo
1  sur  33
MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12
OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
MANAGING INTERNET EXPLORER CONNECTIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
NEW CONNECTION WIZARD (DIAL-UP) Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
NEW CONNECTION WIZARD (BROADBAND) Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
CONFIGURING LAN AND PROXY SERVER CONNECTIONS Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
CONNECTING TO INTERNET RESOURCES ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
UNIFORM RESOURCE LOCATORS Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
WEB SITE RESOURCES ,[object Object],[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
USING FTP Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
WEB FOLDERS Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
INTERNET EXPLORER SECURITY ,[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
URL ACTIONS (SECURITY SETTINGS) Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
WEB CONTENT ZONES (SECURITY ZONES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
CONFIGURING ZONE SECURITY Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
POLICY–BASED SECURITY MANAGEMENT Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
ADVANCED SECURITY SETTINGS Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
… Notes… ,[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
TYPES OF COOKIES ,[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
TYPES OF COOKIES ,[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
MANAGING COOKIES Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
BLOCKING POP-UPS Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
MANAGING TEMPORARY INTERNET FILES Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
MANAGING BROWSER HISTORY Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
CLEARING BROWSER CACHE AND HISTORY Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
AUTOCOMPLETE Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
INTERNET EXPLORER PASSWORD CACHE Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
CONTROLLING ADD-ON PROGRAMS ,[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
More Detail… ,[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
USING ADD-ON MANAGER Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
SUMMARY ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
SUMMARY (CONTINUED) ,[object Object],[object Object],[object Object],Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY

Contenu connexe

Tendances

Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security SystemMatthew Bricker
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITEAcodez IT Solutions
 
Securing the Web @DevDay Da Nang 2018
Securing the Web @DevDay Da Nang 2018Securing the Web @DevDay Da Nang 2018
Securing the Web @DevDay Da Nang 2018Sumanth Damarla
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensicsAbdulrahman Bassam
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAnne Adrian
 
CMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemCMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemEditor IJCATR
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Internet User Privacy
Internet User PrivacyInternet User Privacy
Internet User PrivacyNHS Student
 
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna BasuSafety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna BasuLounge47
 
ID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersdenniskelly315
 
Data and cyber protection technologies that will make you feel shocked!
Data and cyber protection technologies  that will make you feel shocked!Data and cyber protection technologies  that will make you feel shocked!
Data and cyber protection technologies that will make you feel shocked!►David Clarke FBCS CITP
 
Presentation of Cyber terrorism, Bitcoins & Ransomware
Presentation of Cyber terrorism, Bitcoins & RansomwarePresentation of Cyber terrorism, Bitcoins & Ransomware
Presentation of Cyber terrorism, Bitcoins & RansomwareHemraj Singh Chouhan
 
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...DevDay.org
 

Tendances (18)

Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Securing the Web @DevDay Da Nang 2018
Securing the Web @DevDay Da Nang 2018Securing the Web @DevDay Da Nang 2018
Securing the Web @DevDay Da Nang 2018
 
Internet
InternetInternet
Internet
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
CMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemCMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer System
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Internet User Privacy
Internet User PrivacyInternet User Privacy
Internet User Privacy
 
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna BasuSafety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
Safety & Security Risks in the Hyper-Connected World - IoT - Tamaghna Basu
 
Seminar1
Seminar1Seminar1
Seminar1
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
ID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelers
 
Brute Force Attack
Brute Force AttackBrute Force Attack
Brute Force Attack
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Data and cyber protection technologies that will make you feel shocked!
Data and cyber protection technologies  that will make you feel shocked!Data and cyber protection technologies  that will make you feel shocked!
Data and cyber protection technologies that will make you feel shocked!
 
Presentation of Cyber terrorism, Bitcoins & Ransomware
Presentation of Cyber terrorism, Bitcoins & RansomwarePresentation of Cyber terrorism, Bitcoins & Ransomware
Presentation of Cyber terrorism, Bitcoins & Ransomware
 
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
 

En vedette

El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEuler Ruiz
 
Assistive technology
Assistive technologyAssistive technology
Assistive technologykturne10
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV Btynanderek
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14blusmurfydot1
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoEuler Ruiz
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEuler Ruiz
 
Aparato circulatorio
Aparato circulatorioAparato circulatorio
Aparato circulatorioEuler Ruiz
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricadoCAMPUS11
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mentalEuler Ruiz
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07blusmurfydot1
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06blusmurfydot1
 
Most dangerous searchterm_us
Most dangerous searchterm_usMost dangerous searchterm_us
Most dangerous searchterm_usAngeline KH
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise Worldefim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Pleaseefim13
 

En vedette (20)

El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV B
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
 
Aparato circulatorio
Aparato circulatorioAparato circulatorio
Aparato circulatorio
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricado
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
 
Most dangerous searchterm_us
Most dangerous searchterm_usMost dangerous searchterm_us
Most dangerous searchterm_us
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise World
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
Organizadores
OrganizadoresOrganizadores
Organizadores
 
Javascript for Wep Apps
Javascript for Wep AppsJavascript for Wep Apps
Javascript for Wep Apps
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
 

Similaire à IT103Microsoft Windows XP/OS Chap12

Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Vignesh kumar
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11blusmurfydot1
 
The Power of HTML5 Offline: Mobile and More!
The Power of HTML5 Offline: Mobile and More!The Power of HTML5 Offline: Mobile and More!
The Power of HTML5 Offline: Mobile and More!FITC
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docxjackiewalcutt
 
Exchange Data Loss Prevention in Exchange 2013 - Exchange Online
Exchange Data Loss Prevention in Exchange 2013 - Exchange OnlineExchange Data Loss Prevention in Exchange 2013 - Exchange Online
Exchange Data Loss Prevention in Exchange 2013 - Exchange OnlineJethro Seghers
 
Module 8 configuring internet explorer 9.0
Module 8   configuring internet explorer 9.0Module 8   configuring internet explorer 9.0
Module 8 configuring internet explorer 9.0xeroxk
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy serverMeera Hapaliya
 
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks
 
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureLow Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureMongoDB
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source DatabasesGazzang
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptxdereje33
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
Cisco Connect Ottawa 2018 consuming public and private clouds
Cisco Connect Ottawa 2018 consuming public and private cloudsCisco Connect Ottawa 2018 consuming public and private clouds
Cisco Connect Ottawa 2018 consuming public and private cloudsCisco Canada
 
Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlationrahul8590
 

Similaire à IT103Microsoft Windows XP/OS Chap12 (20)

Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers Desktop Support Engineer Interview Questions & Answers
Desktop Support Engineer Interview Questions & Answers
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
 
Squid server
Squid serverSquid server
Squid server
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11
 
The Power of HTML5 Offline: Mobile and More!
The Power of HTML5 Offline: Mobile and More!The Power of HTML5 Offline: Mobile and More!
The Power of HTML5 Offline: Mobile and More!
 
Squid
SquidSquid
Squid
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docx
 
Exchange Data Loss Prevention in Exchange 2013 - Exchange Online
Exchange Data Loss Prevention in Exchange 2013 - Exchange OnlineExchange Data Loss Prevention in Exchange 2013 - Exchange Online
Exchange Data Loss Prevention in Exchange 2013 - Exchange Online
 
Module 8 configuring internet explorer 9.0
Module 8   configuring internet explorer 9.0Module 8   configuring internet explorer 9.0
Module 8 configuring internet explorer 9.0
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
 
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureLow Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source Databases
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptx
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
Cisco Connect Ottawa 2018 consuming public and private clouds
Cisco Connect Ottawa 2018 consuming public and private cloudsCisco Connect Ottawa 2018 consuming public and private clouds
Cisco Connect Ottawa 2018 consuming public and private clouds
 
Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlation
 

Plus de blusmurfydot1

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01blusmurfydot1
 

Plus de blusmurfydot1 (15)

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
 

IT103Microsoft Windows XP/OS Chap12

Notes de l'éditeur

  1. In this chapter, students learn about managing the settings of Internet Explorer. They will learn about the types of Internet connections that Internet Explorer can use and how to use Internet Explorer to connect to Internet resources. They will also explore security settings and Web content zones. Finally, they will learn about the privacy features built into Internet Explorer and how to manage features new to Service Pack 2, such as Pop-Up Blocker and Add-On Manager. As you present these topics, stress the critical importance of understanding the available security options to properly balance security and functionality with Internet Explorer.
  2. Internet Explorer can connect to the Internet in a variety of ways. This slide focuses on the most common connection types used with Internet Explorer. As you discuss each item, ask for a show of hands for who has used each connection type. If you have a strong showing for dial-up, you might want to spend more time with broadband and proxy server connections.
  3. This slide depicts the use of the New Connection Wizard to add a dial-up connection. Point out that the wizard can be launched from Network Connections or from the Connections tab of the Internet Options dialog box.
  4. This slide shows configuration of a broadband connection using Point-to-Point Protocol over Ethernet (PPPoE). Describe how this would differ from a common broadband connection using a cable or a DSL gateway.
  5. Configuring a LAN connection typically does not require any special actions in Internet Explorer unless the network uses a proxy server for Internet access. This slide shows a proxy server being configured both automatically (second frame) and manually. Take a minute to discuss Web Proxy Auto-Discovery (WPAD) and how it provides proxy server configuration to the client.
  6. This section concentrates on using Internet Explorer as a client of various Internet services. Describe the structure of a URL, and describe methods of connecting to Web sites, FTP servers, and Web folders.
  7. This slide breaks down the format of a URL into its basic parts. Students should be familiar with the parts of a URL so they can spot URLs that are incorrectly entered. If time permits, launch Internet Explorer and open a few Web pages and resources using other types of URLs. Discuss the URLs used and identify their parts. Show students how CGI and other programming techniques use additional special syntax in their URLs.
  8. This slide presents a list of Web site resources. Discuss each one and be prepared to present examples of each. If possible, navigate to sites that use each type of resource to demonstrate its aspects. Point out whether a site is using plain HTML, frames, ActiveX controls, or even Web applications.
  9. This slide shows Internet Explorer browsing the Microsoft FTP site ( ftp://ftp.microsoft.com ). Point out the familiar folder metaphor that allows users to navigate the FTP site much more effectively than by using command-line FTP with its MS-DOS or UNIX navigation syntax. Discuss the Log On As dialog box and how you can use it to provide authentication to the FTP server.
  10. This slide shows the Open dialog box in Internet Explorer. Point out the Open As Web Folder check box. If a Web folder resource exists on your classroom network, demonstrate connecting to it using Internet Explorer.
  11. Internet Explorer has the ability to restrict dangerous content, but most users have no idea where or how to configure the appropriate settings. This section discusses Web content zones, URL actions, and the security options available on the Advanced tab of the Internet Options dialog box. While some browsers avoid security vulnerabilities by not supporting ActiveX and other Microsoft browser standards, they suffer a loss of compatibility with Microsoft servers and technologies. Microsoft Internet Explorer supports these technologies and can offer excellent security if properly configured. Be sure to stress the importance of properly configuring security settings.
  12. This slide depicts some of the settings available for Web content zones to control access and security in Internet Explorer. Refer to the textbook for the complete list of URL action settings that can be configured in Internet Explorer. Discuss these settings and their function, and offer scenarios in which you might use one setting instead of another to provide the correct mix of functionality and security. Point out the ability to disable ActiveX or other active content, and mention that administrators can configure these settings for thousands of systems at once by using Group Policy.
  13. Web content zones are used to group together Web sites that have similar security requirements. They make it easier to design effective browser security measures. Discuss each zone in turn. Be sure to mention that the Local Machine zone is not accessible with the GUI—it is configured via registry entries or Group Policies. Membership in Local Machine sites is automatically maintained based on the location and the nature of the resource you are accessing. Point out the ability to maintain the Local Intranet zone by address as well as by Web site.
  14. This slide shows selected screens related to Web content zone security settings. If you can, demonstrate setting security settings and adding sites to a zone. Point out the ability to select URL action templates by moving the slider on the Security tab of the Internet Options dialog box or by selecting the template in the Security Settings dialog box for the selected zone.
  15. This slide depicts configuring settings for the Internet zone in the Group Policy console (Gpedit.msc). If time permits, demonstrate setting a few settings using Gpedit.msc. Also, point out the additional settings under Security Features in the lower-left portion of the screen. Many of these are new with Service Pack 2 and provide important new security functions for Internet Explorer. Mention that domain-level Group Policy settings for Internet Explorer look exactly like those in Gpedit.msc.
  16. This slide shows some of the security settings on the Advanced tab of the Internet Options dialog box. Demonstrate how to manage these settings, and show how to get additional information on each setting by clicking the ? button in the Internet Options dialog box and then clicking the item to see a help tip.
  17. Privacy is, in many ways, more important than security. Hacked systems that have damaged files or are overrun by viruses can be reformatted and reinstalled. The loss of trade secrets and personal data can do irreparable damage to a company’s (or an individual’s) reputation. This section covers the privacy controls in Internet Explorer. Spend a minute on each bullet item and describe why it is important in preventing the loss of privacy data.
  18. Give an example of where each cookie type in the list might be used.
  19. Give an example of where each cookie type in the list might be used.
  20. This slide depicts managing cookie settings for a system. The first frame shows setting High privacy for this system and allowing cookies from adatum.com. The final frame shows the Advanced Privacy Settings dialog box being used to override settings. If you can, demonstrate these settings live in Internet Explorer and discuss the available options as you do so.
  21. Pop-up ads are an annoyance, at best, and a potential security risk to many users of the Internet. Beginning with Windows XP SP2, Internet Explorer has a built-in Pop-Up Blocker. Demonstrate the settings so students will be familiar with the configuration of this feature.
  22. Internet Explorer uses a browser cache to speed navigation for frequently used Web pages. Show how to configure the amount of disk space to use for the Temporary Internet Files folder. Point out the View Files and View Objects buttons. View temporary Internet files in class, if possible.
  23. Internet Explorer maintains a history of Web sites visited. This history forms a virtual clickstream that can show where and when a user accessed specific sites. Mobile users should be trained to clear their history frequently to prevent others from learning their trade contacts or accessing their research sites. Show students how to configure the number of days retained in the History feature.
  24. Clearing temporary Internet files and the browser history is part of protecting your privacy on your system. Purging these repositories makes it much more difficult for someone to learn about your Internet usage habits. Point out the Delete Cookies button and ask your students why you shouldn’t simply delete cookies along with other Internet data. (Persistent cookies might be useful to retain.)
  25. Internet Explorer uses the AutoComplete feature to guess users’ intentions as they type in address bars and forms in Internet Explorer. Entries are saved into an AutoComplete data store. Items in this data store can be accessed by external applications, revealing private information that the user might have entered in a form. This slide shows AutoComplete being configured to remember entries entered into forms, address bars, usernames, and passwords. Point out the Clear Forms button, which deletes all AutoComplete data used in forms.
  26. Internet Explorer can remember Web site passwords. They are stored in hashed form in the registry but can be decrypted by external applications. You can clear the contents of the Internet Explorer password cache by clicking the Clear Passwords button in the AutoComplete Settings dialog box.
  27. Browser add-on applications and BHOs are designed to extend and control the capabilities of Internet Explorer. They also can be designed to control Internet Explorer for malicious purposes. Many forms of Internet spyware are add-ons or BHOs. Add-On Manager helps control the add-on and BHO applications on a system. If time permits, demonstrate using Add-On Manager. Describe how it is used to disable BHOs and other add-ons.
  28. This slide shows Add-On Manager being used to view installed add-ons and BHOs. Point out the areas of this dialog box. If time permits, demonstrate disabling and enabling an add-on or a BHO.
  29. As you discuss these items, reiterate the importance of configuring security properly.
  30. Ask students if they have any additional questions about these topics.