LOGO

Geek School: Learning Windows 7 - Managing Internet Explorer

March 11, 2013
Geek School: Learning Windows 7 - Managing Internet Explorer

Exploring the Evolution of Internet Explorer

While often viewed as intricate, Internet Explorer has undergone significant improvements throughout its development. Despite not always being the preferred browser among tech enthusiasts, it now presents a compelling set of features.

This article aims to showcase the capabilities and advancements that Internet Explorer currently offers to users.

Related Articles in the Geek School Series

For a more comprehensive understanding of Windows 7, consider reviewing these preceding articles from the Geek School series:

  • Introducing How-To Geek School: An overview of the series' objectives.
  • Upgrades and Migrations: Guidance on upgrading and migrating Windows installations.
  • Configuring Devices: Instructions for setting up and configuring hardware devices.
  • Managing Disks: Techniques for effective disk management within Windows 7.
  • Managing Applications: Methods for installing, updating, and removing software applications.

Further installments of this series will be published throughout the week, providing continued insights into Windows 7 functionality.

Keep checking back for more in-depth guides and tutorials.

Compatibility View in Internet Explorer

Internet Explorer has historically presented challenges in displaying webpages designed for older browser versions. Microsoft addressed this issue with the implementation of a feature known as Compatibility View.

Essentially, this functionality enables users to render webpages utilizing the rendering engines found in earlier iterations of Internet Explorer.

How to Activate Compatibility View

Activating Compatibility View is a straightforward process. Simply click the icon resembling a torn page, conveniently situated within the URL bar of Internet Explorer.

This action will instruct the browser to display the current webpage as it would have been rendered in a previous version of Internet Explorer, potentially resolving display issues.

Compatibility View is a useful tool for ensuring that websites remain accessible to users who may not have upgraded to the latest browser version.

It provides a bridge between modern web standards and legacy browser technology, enhancing the overall user experience.

RSS Feeds

For those unfamiliar, RSS feeds offer a convenient method for remaining current with the websites you frequent. They enable subscription, delivering updates directly to you. For instance, when How-To Geek publishes a new article, you’ll be promptly informed.

Within Internet Explorer, an orange RSS button indicates that the currently viewed website offers RSS feed support.

How RSS Works

Subscribing to a feed allows for rapid checking of new content releases. You can quickly ascertain if a website has been updated without repeatedly visiting it.

This streamlined process ensures you don't miss important information from your preferred online sources.

geek-school-learning-windows-7-managing-internet-explorer-2.jpg

The visual cue of the RSS button changing color provides immediate notification of updates.

geek-school-learning-windows-7-managing-internet-explorer-3.jpg

This feature simplifies staying informed and saves valuable time.

Security Zones in Internet Explorer

Internet Explorer categorizes all websites into one of four security zones: Internet, Local intranet, Trusted sites, or Restricted sites. The assigned zone dictates the security parameters applied to each website visited. Understanding the intended purpose of each zone is crucial for maintaining a secure browsing experience.

  • Local intranet – This zone is designed for websites hosted within your organization’s internal network.
  • Trusted sites – This zone should contain websites you have explicitly identified as trustworthy, such as those belonging to established business partners.
  • Internet – This zone encompasses all websites on the public internet that are not classified within the Local intranet, Trusted sites, or Restricted sites zones.
  • Restricted sites – This zone is reserved for websites deemed untrustworthy and potentially harmful.

The security settings associated with each zone can be customized to meet specific needs. Access these settings by navigating to the Tools menu and selecting Internet Options.

geek-school-learning-windows-7-managing-internet-explorer-4.jpg

Subsequently, transition to the Security tab within the Internet Options window.

geek-school-learning-windows-7-managing-internet-explorer-5.jpg

You can select a pre-configured security level using the slider, or fine-tune settings by clicking the Custom level button.

geek-school-learning-windows-7-managing-internet-explorer-6.jpg

Adding a Site to the Trusted Sites Zone

To incorporate a website into the Trusted Sites zone, first select the zone and then click the Sites button.

geek-school-learning-windows-7-managing-internet-explorer-7.jpg

Enter the URLs of websites you confidently recognize as safe. Then, click the Add button to include them.

geek-school-learning-windows-7-managing-internet-explorer-8.jpg

The same process can be applied to other zones, but exercise caution when determining which sites to add to each.

Managing Browser Extensions

Internet Explorer utilizes add-ons, similar to extensions or plug-ins in other browsers, to expand its functionality. Toolbars represent a common type of add-on, often installed alongside other applications. To manage these toolbars, access the Tools menu and select Manage Add-ons.

geek-school-learning-windows-7-managing-internet-explorer-9.jpg

Within this interface, you can right-click on any toolbar and choose to disable it. Complete uninstallation typically requires using the Control Panel, as with any other application.

geek-school-learning-windows-7-managing-internet-explorer-10.jpg

Customizing Search Providers

Add-ons also include Search Providers, enabling you to integrate additional search engines into Internet Explorer. To manage these, navigate to the Search Providers section.

geek-school-learning-windows-7-managing-internet-explorer-11.jpg

In the lower-left corner of the window, you’ll find a hyperlink labeled “Find more search providers…”. Click this link.

geek-school-learning-windows-7-managing-internet-explorer-12.jpg

This will present you with a selection of thousands of available providers.

geek-school-learning-windows-7-managing-internet-explorer-13.jpg

Once added, you can initiate searches on that site directly from the browser’s search bar.

geek-school-learning-windows-7-managing-internet-explorer-14.jpg

Private Browsing with InPrivate Mode

InPrivate Mode functions as the privacy-focused browsing option within Internet Explorer, mirroring the functionality found in Chrome’s Incognito mode. Essentially, it provides a method for web browsing that prevents the storage of activity on your computer.

This is achieved by confining all browsing data to the duration of the session. Upon closing an InPrivate window, specific data is automatically removed.

Data Cleared by InPrivate Mode

  • Cookies generated during the session are deleted.
  • Your browsing history is not saved.
  • The browser cache is emptied of any temporary files.

Initiating an InPrivate browsing session is straightforward. Navigate to the "Safety" menu within Internet Explorer and select the "InPrivate Browsing" option.

A visual indicator in the URL bar confirms when InPrivate Mode is active.

This allows users to maintain a degree of online anonymity and prevent the retention of browsing information on their local systems.

Security Features

Internet Explorer incorporates several security features that are important to understand for certification purposes. The focus is on recognizing these features and confirming their integrated status within the browser.

Popup Blocker

To prevent unwanted advertisements, Internet Explorer includes a built-in Popup Blocker. This system operates on a whitelist basis, initially blocking all popups by default. Users can then grant permission for popups from specific websites by adding their URLs to the whitelist.

Accessing the settings requires navigating to Tools, then selecting Pop-up Blocker, and finally choosing Pop-up Blocker Settings.

InPrivate Filtering

A common revenue model for websites involves displaying advertisements served by third-party advertising networks. This means the content displayed isn't always directly from the website you're visiting. Over time, these advertising companies have utilized this method to track user browsing habits for targeted advertising.

InPrivate Filtering aims to counteract this practice by blocking content originating from any domain other than the one you are actively browsing.

Protected Mode

Protected Mode leverages three core Windows features: UAC (User Account Control), MIC (Mandatory Integrity Control), and UIPI (User Interface Privilege Isolation). These components work in concert to allow Internet Explorer to run with reduced privileges, even when an administrator is logged in.

This design limits the potential damage an attacker could inflict, even if they were to gain access to the Internet Explorer process.

SmartScreen Filter

The SmartScreen Filter is comprised of three distinct elements. First, a heuristics engine analyzes webpages in real-time for potentially harmful behaviors, issuing warnings when suspicious activity is detected.

Second, it actively defends against phishing attempts by comparing visited URLs against a database of known phishing sites, blocking access to malicious pages. Finally, downloaded files are scanned against a list of known unsafe programs to prevent the execution of harmful software.

Certificates

Consider a scenario where a financial institution launches an online banking service. A significant challenge arises if customers express reluctance to utilize the platform due to concerns about verifying the authenticity of the connection.

This highlights the critical need for identity verification, a core function addressed by digital certificates. The system relies on a foundation of trust established with a limited number of recognized entities known as Public Certification Authorities.

Our confidence in these authorities stems from the presence of a pre-installed file – a certificate – for each within our Trusted Root Certification Store. If an entity seeks to establish its online identity, it can apply to one of these authorities, such as Thawte or VeriSign.

These authorities conduct thorough background investigations before issuing a certificate, which the entity then installs on its web server. This process validates the entity’s legitimacy.

When a user accesses the bank’s online portal, their web browser identifies the certificate associated with the bank. Because this certificate was issued by a trusted authority, the browser confirms the website’s ownership.

Beyond authentication, these certificates also secure user data by encrypting the communication between the browser and the server. This encryption protects sensitive information during transmission.

Users can readily examine the verifying authority for any website by simply clicking the padlock icon located in the URL address bar.

geek-school-learning-windows-7-managing-internet-explorer-19.jpg

Assignment Completion

A comprehensive review of the browser's functionalities was conducted today. Consequently, students are excused from further work for the present time.

Should any inquiries arise, you are welcome to reach out via Twitter to @taybgibb, or simply post a comment.

Further assistance can be obtained through these channels if needed.

Contact Information

  • Twitter: @taybgibb
  • Comments Section

These resources are available to address any lingering uncertainties regarding the material covered.

Browser features were extensively explored during the session. Students are encouraged to utilize the provided contact methods for clarification.

#Windows 7#Internet Explorer#browser management#Geek School#IE settings#internet options