Owser and Security Configuration (Part 2) ..........
Owser and Security Configuration (Part 2) ..........
REMAINING PORTION
STEP 1
STEP 2
1
STEP 3
Choose the File Types tab. In the list of registered file types, look
for VBScript Script File. If you can't find this, you have nothing to
worry about, and you can click the Cancel button until you return to
the desktop.
STEP 4
2
SHOW ME
1. go to my computer.
2.go to tools
3
3. go to folder options
4. go to file types
4
5. then this screen will come
5
7. click on delete
6
9. then click on close
7
10. Now you are done
PROXIES
A proxy server saves you time and saves your employer or your
school money by reducing the number of times that requests for
data are sent to the Internet. A proxy server temporarily caches
most downloaded files and later provides these files to users instead
of sending each individual request out on the Internet.
8
The following steps can be used to configure the proxy settings in
Internet Explorer:
STEP 1
STEP 2
9
STEP 3
10
Determine the option that corresponds to the way in which the PC
connects to the Internet, and then click either the Settings button in
the Dial-Up and Virtual Private Network Settings section or the LAN
Settings button in the Local Area Network (LAN) settings area. In
this example we'll configure a proxy server on a LAN connection.
Click LAN Settings to continue ……….
STEP 4
11
In the Local Area Network (LAN) Settings window, find the Proxy
server area and select the Use a Proxy Server check box.
If the Bypass Proxy for Local Addresses check box is unselected,
leave it that way or check with your network administrator to
determine how it should be set. Click Use a proxy server to
continue……..
STEP 5
Click the Advanced button in the Proxy server area to open the
Proxy Settings window. Click Advanced to continue……
12
STEP 6
NOTE
13
CONFIGURING BROWSER SECURITY SETTINGS
The basis for security in the Internet Explorer Web browser software
is its security zones. You can assign any site to any of the four
security zones that are defined by Internet Explorer, and you can
permit or restrict the assigned site as you set up each zone. To
define security zones, choose Tools Internet Options, then click
the Security tab.
14
The four security zones defined by Internet Explorer are as
follows:
15
Think About It
(A) Windows 98
(B) Windows 2000
SECOND QUESTION
16
Pages a user views on the Internet are stored on the proxy
server via the Windows Internet Explorer Temporary Files
feature.
(A) True
(B) False
ANSWER IS false
THIRD QUESTION
17
ANSWER IS :- SO CLICK ON CONNECTIONS
FOURTH QUESTION
1. LOW
2. HIGH
ANSWER IS
18
The correct sequence is 1, 1, 2, 1. The only zone that contains any
Web sites by default is the Local Intranet zone, which includes sites
local to the network or computer (and which in some cases is set to
Medium by default).
Trusted sites includes Web sites that you have indicated are safe to
trust. Restricted sites are those you've indicated it's not safe to
trust. All other Web sites not included in any of the other zones are
assigned to the Internet zone, where security is set to LoW.
SUMMARY
19