Where to look for Explorer browser settings. Where can I find Internet Explorer browser properties? Delete cookies and clear browser cache

Setting up the Internet Explorer browser. Today we will talk about a web browser, namely the veteran of Internet navigation, the well-known Internet Explorer.
And so Internet Explorer was developed by Microsoft and built into the Windows operating system by default. That is, it is installed along with the installation of Windows itself and is updated automatically if you do not change the settings.

Now a little about him. Like any browser, Internet Explorer has an address bar, which can be used not only to access pages but also as a field for entering search queries. By the way, the default search engine for address bar can be customized according to the user's wishes.

Supports Internet Explorer to work simultaneously with big amount tabs, has the ability to create bookmarks and has a large number additional settings and functions that are often not expected from it, as from the default browser (browser included).

Let's look further at the simple settings.
Address bar - used directly to enter website addresses and to enter search queries. If everything is clear about the addresses, then with search queries a little more complicated. There are many search engines (Google, Bink, Yandex, etc.), to set the default search engine to the one you use, you need to go to settings (click on the gear in the mountain on the right), then select “configure add-ons”. In the window that opens, select “search services”, select the one you need and click on the “Set as default” button.


if your search engine is not in the list, follow the link at the bottom of the “Find other search services” window and find the one you need in the list and add it.


When launching a browser, at startup, each user wants to see his or her pages that he regularly views, and not those offered by default. This is very easy to do, again go to the settings, select “Internet Options” in the window that opens, the “General” tab, then in the “Home Page” field we register your site or sites via Enter, click apply and ok.


An average user, when searching for information, looks at a lot of sites, so there is often a need to save a link to a site in order to return later. To do this, you can add the site to your favorites; this is very simple; when viewing the site, click on the browser settings and select “add site to the list of applications.” Now, if you need to quickly go to this site, just click on the star icon next to the settings icon and a list of saved sites will open in front of you.


If we talk about the icons in the mountain on the right (gear-settings, star-selected sites, house-view). Then by clicking on the house we will be taken to the start page or group of pages that opens when we launch the browser. This is convenient when you work a lot with one site, and in a split second (with one click) you immediately get to it.


In general, we introduced you to the main functions of the Internet Explorer browser, which should be configured for convenient work in it.

Let's look at the IE menu - Tools>Internet Options. The Internet Options window contains seven tabs. The most interesting tabs for us are General and Connection (Fig. 11.5). Basic settings are collected on the Connections tab (Fig. 11.5, right). The Install button launches the New Connection Wizard. In the Settings area remote access There are three selectors: Never use, Use when there is no network connection, Always use the default connection. The first selector - Never use - is turned on when connecting only via local network.

If you are connecting exclusively via modem (and there is no possibility of connecting to the Internet via a local network), select Use when there is no network connection. This selector is also selected for connecting via a modem if it was not possible to connect via the local network. The last selector Always use default connection is selected to connect the default modem connection.

Internet access can be optimized using a proxy server. Its use is not always necessary, but it is desirable. When using a proxy server, the Use proxy server option must be checked. Disabling this option allows you to establish communication “directly”, for example, if the proxy server fails.

The General tab of the Internet Options window is shown in Fig. 11.5 (left). To reduce the loading time of the browser, we recommend that in the Home Page area, click on the From Empty button. If there is not enough disk space, on the same tab you can use the Delete files button in the Temporary Internet files area or configure their storage settings using the Settings button. The purpose of the standard buttons (Colors, Fonts, Apply or OK) should be clear to you, so we won’t dwell on them.

The options on the Programs tab of the Internet Options dialog box should also be straightforward. By default it has standard Windows applications, used for the HTML editor, Email, newsgroups and Internet calls. If you want IE to be the default browser, check the Check if IE is the default browser option.

Fine-tuning IE is done on the Advanced tab. Check required parameters in the Settings list. The list is quite extensive - after studying it, you will configure the browser with maximum (for you) convenience. There is no risk here, because the Restore Defaults button will always allow you to return to the original values.

To switch to mode Internet settings Explorer in the Control Panel, you need to select the Network and Internet Connections category, and then select the Internet Options icon. As a result, the Internet Properties window will appear on the screen. This window contains the following tabs: General, Security, Confidentiality, Content, Connections, Programs and Advanced.

Let's look at how to work with each of them.

On the General tab, configure general-purpose settings.

In the Address field, indicate the address of the web page that the user has selected as his home page. The home web page is the page on the Internet that opens by default every time you open your browser. You can return to this page at any time while browsing the Internet by clicking the Home button on the toolbar or selecting View Go Home Page from the main menu of the Internet Explorer window.

Pressing the From current button allows you to select as your home page the page that is open in this moment. The From original button restores as the home page the page that was set when installing the browser. If you do not need the home page, you should click the C empty button. In this case, when you start the Internet browser, it will open empty page, and the Address field will take the value about:blank To delete temporary Internet files, use the Delete Cookies and Delete Files buttons. Using the Options button, you can switch to the mode for setting up and editing the settings for the Temporary Internet Files folder.

The Settings window will appear on the screen. Using the Check for updates to saved pages switch, set the required mode for checking for updates to saved pages. The Temporary Internet Files Folder area displays the location of the folder that contains temporary Internet files. In the Occupy on disk no more than field, indicate the maximum amount of hard disk space allocated for this folder.

Using the Move button, you can move the Temporary Internet Files folder to a specified location; this will open the Browse Folder window, in which, according to the usual Windows rules, you should specify the required path. To open the folder with temporary Internet files, use the View Files button. In the How many days to store links field on the General tab, indicate the number of days during which the browser should store links to recently visited pages. Using the Colors button, you can switch to the mode for selecting colors for displaying web pages. When you click this button, a window will open.

Security Settings
On the Security tab of the Internet Properties window, configure Internet security settings. The top part of this tab lists the Internet areas accessible from this local computer. The Security Level for this zone area displays the security level settings for the zone highlighted at the top of the tab. To change these settings, click the Other button. If necessary, you can restore the default security settings for each zone. To do this, click the Default button (you must first select the icon for the required Internet zone).

Confidentiality
The Privacy tab contains options that help you configure the level of privacy when browsing the Internet. The required level of confidentiality is set using the appropriate slider. A short description of the selected privacy level is displayed to the right of the slider. By clicking the Advanced button, you can go to the mode for setting up additional privacy settings (in particular, in this mode you can configure how the browser handles Cookie files). If necessary, you can configure privacy for individual websites.

To do this, use the Change button. When you click it, the Privacy window for individual websites opens, in which you perform the necessary actions. The Contents tab contains parameters for accessing information received from the Internet, parameters for the auto-fill mode, and some personal user data. Using the Settings button, you can switch to the mode for setting restrictions on information received from the Internet. This opportunity Particularly useful for monitoring children's visits to certain websites and their exposure to certain materials. After clicking this button, the Access Restriction window opens.

When you initially open this window, the system will prompt you to enter an access password, which you should remember, since the system will prompt you for this password on subsequent attempts to enter this mode. Using the Enable (Disable) button, you enable/disable the established restrictions; In this case, you also need to enter an access password. By clicking the Autofill button on the Contents tab, you can switch to the mode for setting autofill parameters. This will open the corresponding window. In this window, you define the objects for which you want to use auto-fill ( possible options- for web addresses, forms, usernames and passwords in forms), and also clear the auto-fill log (using the Clear forms and Clear passwords buttons).

If the Prompt to save password checkbox is selected, the system will ask whether to save the new password after entering it in the field of the web page. If the answer is yes, the password will be saved, and in the future, when you enter a user name in a field on a web page, the system will automatically display the password corresponding to this name. To enter some personal information about the user that you provide to certain websites, on the Content tab, click Profile.

Connections
The Connections tab contains information about previously configured Internet connections. To create a new computer connection to the Internet, you must click the Install button. As a result, the New Connection Wizard window will appear on the screen (the procedure for creating a new connection is described in section).
To create a new one network connection you should use the Add button; to delete an existing one, use the Delete button (you must first place the cursor on the object to be deleted). Using the Settings button, you can switch to the mode of viewing and editing the parameters of the network connection highlighted in the list of connections. To switch to the mode for setting up local network parameters, click the LAN Setup button.

Programs
On the Programs tab, you define programs that will be used automatically when working with the Internet. In the HTML Editor field, from the drop-down list, select the program that the browser will use to edit HTML files: Microsoft Word, Microsoft Excel or Notepad. Depending on the value of this field, the corresponding command will be displayed in the File submenu of the main menu of the Internet Explorer window. If Microsoft Word is selected in the HTML Editor field, the Edit in command appears on the File menu. Microsoft Office Word, if Microsoft Excel is selected - the command will be called Edit in Microsoft Office

Excel, if Notepad is selected - Edit in Notepad.
- In the Email field, from the drop-down list, select the email program (for example, Outlook Express or The Bat!) that Internet Explorer will use.
- In the Newsgroups field, indicate a program designed to read Internet newsgroups, which Internet Explorer will use.

In the Internet connection field, indicate the dialing program that Internet Explorer will use.
- In the Calendar field, indicate the Internet calendar program that Internet Explorer will use.”
In the Address Book field, select the program address book, which Internet Explorer will use. If you check the box
Check if Internet Explorer is the default browser - Every time you start Internet Explorer, the system will check if it is the default browser. If another Internet browser is used as the default, the system will offer to restore the use of Internet Explorer as the default one. Checking this box makes sense if, in addition to Internet Explorer, another browser is installed on your computer.

Additionally

On the Advanced tab, you can configure additional parameters for some browser modes. In particular, using the appropriate checkboxes, you can turn on/off the display of pictures and their frames, playback of animations, sounds and videos on web pages, automatic check for Internet Explorer updates, etc. Security settings are included in a separate section. If necessary, you can restore the system default settings by clicking the Restore Defaults button.

All parameters of this tab, depending on their functional purpose, are divided into groups: Microsoft VM, Security, Multimedia, HTTP setup 1.1, Browse, Print, Search from the address bar, and Accessibility. Let's look at each of them. Microsoft VM In the Microsoft VM group, perform the following settings.

If you select the Log Java language check box, the browser will log all active Java programs.
- If the Use Java Jit compiler checkbox is selected, then when you visit a Web site that uses Java programs, the browser will automatically create such programs and run them. In other words, this flag enables Internet Explorer to use the built-in Java compiler.

It is recommended to select the Java Language Tableau enabled checkbox if you plan to test Java programs. Settings made using the Use Java Jit Compiler and Java Language Tableau enabled check boxes take effect only after you restart the computer.

Safety
- This group allows you to configure additional security settings.
- By checking the SSL 2.0, SSL 3.0 and TLS 1.0 checkboxes, enable the mode in which the browser will send and receive confidential information using the SSL 2.0, SSL 3.0 and TLS 1.0 protocols, respectively. The following must be taken into account:
- SSL 2.0 protocol is supported by all secure websites;

SSL 3.0 is more secure than SSL 2.0, but some websites do not support it;
- TLS 1.0 protocol has a degree of security comparable to that of the protocol
- SSL 3.0; Some websites do not support this protocol.
- By checking the Enable Integrated Windows Authentication checkbox, you enable Integrated Windows Authentication mode. The setting of this parameter takes effect only after the computer is restarted.

If you select the Enable Profile check box, the browser will prompt websites to provide them with the user's profile information. If you clear this checkbox, the browser will not transmit information about the user and, accordingly, display requests from web sites.
- Selecting the Do not save encrypted pages to disk checkbox prohibits storing secret information in the folder with temporary Internet files. It is recommended to install this mode if several users have access to the computer.
- If you select the Warn about switching security mode checkbox, the browser will notify you when switching between secure and unsecured Internet sites.

By checking the Signature verification for downloaded programs checkbox, the authentication mode of downloaded programs is enabled. - If you select the Check for revocation of server certificates checkbox, Internet
- Explorer will check the validity of peer certificates on the Internet. - This setting takes effect only after the computer is restarted.
- If you select the Delete all files from the Temporary Internet Files folder when closing the browser checkbox, then when you close the Internet Explorer window, the Temporary Internet Files folder will be automatically cleared.

Multimedia
In this group the following parameters are configured.
If you select the Enable automatic image resizing checkbox, the browser will reduce the size of oversized images on web pages. The Play animation on web pages checkbox enables/disables the animation playback mode on web pages. Some web pages that contain animation load very slowly, and to speed up their loading, it is advisable to check this box.

Using the Play videos on web pages and Play sounds on web pages checkboxes, you can turn on/off playback modes for video and sounds on web pages, respectively. By clearing the Show pictures check box, you can disable the display mode graphic images in order to speed up the loading of web pages. If you select the Show picture frames checkbox, then the picture frames will be displayed while pictures are loading. This will allow you to get an idea of ​​​​the arrangement of elements of a web page before it is completely loaded. Enabling this mode only makes sense if the Display pictures checkbox is selected.

By checking the Enhanced color reproduction checkbox, you enable the mode
smoothing images. Setting up HTTP 1.1 In this group, two parameters are configured. By checking the Use HTTP 1.1 checkbox, you enable the mode of using the HTTP 1.1 protocol when connecting to websites.
If you select the Use HTTP 1.1 through proxy connections checkbox, the browser will use the HTTP 1.1 protocol when connecting to websites through a proxy server.

Review
In this group the following parameters are configured. If you select the Automatically check for Internet Explorer updates checkbox, the browser will periodically check for Internet updates. new version programs. When a new version is detected, a corresponding message will appear and the browser will ask you to confirm its download. If you select the Enable display styles for buttons and other controls on web pages checkbox, the browser will apply the settings to style the web pages. Windows screen(see section 3.1).

If you select the Enable personal Favorites menu checkbox, links that have not been used for a long time will not be displayed in the Favorites submenu of the main menu of the Internet Explorer window. To go to them you need to click on the arrow located at the bottom of the menu. If you clear the Enable third-party browser extensions check box, the browser will not be able to use tools designed for Internet Explorer that were not developed by Microsoft. This setting takes effect only after the computer is restarted. If you select the Enable on-demand installation (Internet Explorer) check box, Internet Explorer will automatically download and install the necessary components to perform a particular task.

If you select the Output detailed messages about http errors, then if an error occurs when connecting to any server, the browser will display detailed information about the error and tips on how to resolve it. If this checkbox is cleared, the browser will only display the error code and name.

By checking the box

Use built-in auto-fill enables the mode to automatically fill in web addresses in the address bar as you type them. In this case, the browser uses the previously entered addresses that partially or completely coincide with the desired one. If you clear the Use the same window to load shortcuts check box, web pages opened using links from any document or program other than Internet Explorer will be displayed in a new browser window.

If you select the Use passive FTP protocol (for compatibility with firewalls and DSL modems) check box, the browser will use the passive FTP protocol, which does not require determining the computer's IP address. This mode is considered safer.
Using the Underline links switch, select the desired link underlining mode:
Always - links are underlined all the time (this mode is set by default); Never - links are not underlined; On hover - links are underlined only when you move the mouse pointer over them. If you select the Show Go button in address bar checkbox, the Go button will be present in the address bar of the browser window.

By checking the Show short links checkbox, you enable the mode of briefly displaying the address of an object (link, picture, etc.) in the status bar. If this checkbox is cleared, the object address is displayed in the status bar in full format. If you select the Allow folder views for FTP sites checkbox, FTP sites will appear as a folder (like in Explorer). If this check box is cleared, FTP sites are displayed in HTML format (this is the default setting). If you select the Notify when downloading is complete checkbox, a corresponding message will appear on the screen after the files are downloaded.

In the Print area, you can configure only one setting. If you select the Print background colors and designs check box, when you print a web page, the background image will also print. Please note that depending on the printer used, print speed and quality may deteriorate. Search from the address bar. This area contains a When searching switch, which can take the following values. Do not search from the address bar - when selected, searches from the address bar are disabled.

To search, you will need to use the Search button located in the toolbar of the browser window.
Show results and go to the most similar site - in this case, the search bar will display links to web pages with addresses similar to the one you want. In this case, the browser will open the web page closest to the address you are looking for. Only go to the most similar node - when you select this value, the search results will open the web page whose address is closest to the one you are looking for.

Only show results in the main window - in this case, the results of a search performed using the address bar will be displayed in the main window. Accessibility This group configures the following settings. If you select the Always expand text for images check box, then if the Display pictures in the Multimedia group is unchecked, the size of the picture space will increase to display all the text associated with it. If you select the Move system caret following focus and selection check box, the system caret will move depending on changes in focus or selection. This setting is important when working with programs that use the system carriage to determine the desired area of ​​the screen.

Choose a section Configure for work on electronic trading platforms.

Possible mistakes

If, when working on the ETP, one of the error windows appears:

"Error! The CAPICOM library could not be loaded, possibly due to low permissions on the local machine."

"CAPICOM object is not installed"

“On your computer, the tools for working with digital signatures are missing or incorrectly configured. Contact the supplier of your certificate and CIPF."

"Unable to create object by Object Programming Server."

"Your browser does not have permission to use ActiveX objects."

then you need to follow the steps described below.

How to configure Internet Explorer

1. Make sure you are using Internet Explorer. If your Internet version Explorer is lower than 10, then you need to run the 32-bit version (to do this, open the folder C:\Program Files (x86)\Internet Explorer and run the iexplore.exe file).

If you have operating system Windows 10, make sure you are not opening a browser Microsoft Edge, whose icon is very similar to Internet Explorer.

2. It is necessary to add ETP addresses to Trusted nodes.

  • In Internet Explorer, “Tools” - “Internet Options” (“Browser Options”); go to the “Security” tab;
  • select “Trusted Sites” (“Trusted Sites”); click the “Nodes” button (“Sites”);
  • uncheck the box below “For all nodes in this zone, server verification (https:) is required” (not all ETPs work over a secure https:// connection);
  • In the line “Add the next node to the zone” enter the ETP address (via http and https);
  • insert the website address, after the double slash // put *. and website address. The entered address should take the form “http://*.kontur.ru/”;
  • Click the "Add" and "OK" buttons.

3. For the “Trusted Sites” zone, allow the use of Active-X controls.

  • in Internet Explorer “Tools” - “Internet Options”; go to the “Security” tab; select “Trusted nodes”; click the “Other...” button;
  • In the “Active-X controls and connection modules” section, check “Enable” for all parameters.

4. Download and install CAPICOM-KB931906-v2102.

5. In IE 9 and higher, errors may occur that can be resolved by using the compatibility view (Go to Browser Options - Tools / compatibility view settings / add site address).

Note: this is General settings for all ETP. On some sites, it is necessary to install additional components (for example, the KriptoPro EP browser Plug-in) necessary for the site to function correctly.

According to statistics, internet explorer is one of the most popular browsers. The Internet browser is famous because it is installed by default in Windows, and the user does not need to download the program additionally. Despite the fact that some webmasters sometimes complain about this application, it still continues to occupy a leading position. As of today, the latest version is available on devices with Windows 8, although it is also available for other Microsoft operating systems. Let’s talk in more detail about what the internet explorer browser settings should be.

Internet explorer launch for the first time

The first time you launch the browser, a welcome window will open. If we are talking about how to set up internet explorer 8, then there will be a proposal to speed up the program using add-ons. After you click Next, a window will appear in which you can set preferences for recommended websites. When you activate the Recommended Sites feature, your browser will offer you a list of resources based on which pages you visited most often.

The next window that will open is the selection of parameters. You can leave them as default or change any settings of your choice. If you select special parameters, the user gets the opportunity to configure the browser as convenient for him.

Next, a window will open in your Internet browser in which you can select a search provider. In other words, these are search engines that can be available in the program itself. Once the provider is installed, you will no longer need to go directly to the website to use its services. Its symbol will appear on the browser toolbar. In order to select a resource, put a checkmark next to the inscription, which says that after installation, show the page for selecting a search provider. If you leave this setting as default, you will still access search engines what time is spent on. Therefore, I advise you to mark google, yandex or another resource here. How to make Yandex home page you will find out in more detail.

If we talk about whether it is necessary to search for updates for search services, it should still be noted that the browser searches for them automatically. The Internet browser is equipped with various additional tools. Thus, you can note accelerators that will help you get instant access to the most frequently visited pages. The Browser Setup Wizard will prompt you to enable or disable this function. Some users note that it can slow down the Internet browser, so they prefer to deactivate it. Actually, you can always change the settings, but first I advise you to study accelerators, perhaps you will like them.

SmartScreen filters provide protection against malware and phishing. It is up to everyone to turn them on or off. However, taking into account the fact that cases of computer infections have become more frequent recently, increasing security when connecting to the Internet will not hurt. In versions 8 and above there is such an option as viewing in security mode, talking about how to configure internet browser explorer, you can’t forget about it. It is necessary when visiting web resources optimized for earlier versions of the browser. Everyone can evaluate for themselves how convenient and useful this mode is by turning on the function. Don't forget that you can always turn it off in your browser settings.

Completing the initial setup

After the internet explorer customizer completes its work, if you did everything as described above, three windows will appear in front of the user. First, this is the browser's home page. In addition, windows will open with a list of accelerators and search services. The latter can be bookmarked initially, as they may be useful in the future, for example, for changing these settings and installing updates.

You can select several search services and then click the Finish button. You can find them in the upper right part of the browser. We do the same with accelerators, mark those that you need, and confirm your actions. When might accelerators be needed? For example, if you chose a translator as an add-on, then when you open any page in the browser, you will need to select the text of interest. Next to it you will see a blue arrow, after clicking on it a list of accelerators will appear in front of you. Choose a translator and receive a ready-made text translation almost instantly.

Now let's look at the browser interface directly. At the top of the screen you will see several panels, they contain a wide variety of tools that help the user on how to set up internet explorer 10 or another version of the browser. Command line contains the same buttons as in the browser menu, however, it is intended for quick access to them. Typically, each button has its name written on it, which can be changed by going to Settings and selecting icon display.

Browser settings are located in Tools – Internet Options. Before setting up internet explorer 11 or earlier versions, you should carefully study what is offered by the developers. So, here you can change the home page. To do this, you will need to go to the General tab. If you want a blank page to load, click on the button of the same name. In the address field you can enter the address of the tab from which you want to load.

The listed settings are not all that are offered in internet explorer. A latest versions browser developers have endowed additional features, making working with the Internet browser more comfortable. You shouldn’t be afraid to experiment and change parameters, because if you want, whenever you want, you can always if something doesn’t suit you.

The main purpose of a browser is to view Web pages. Even a small program, occupying only a few tens of kilobytes, can cope with this task. The first browsers were like this. However, during the fierce competition that broke out between the leading programs Netscape Navigator and Microsoft Internet Explorer, both programs acquired a lot of additional customizable features. In particular, Internet Explorer, having emerged victorious from the battle, has turned into a huge software complex that allows you to customize the program to the individual requirements of the most biased user. In this article we will look at most of the settings that are present in the sixth version of Internet Explorer. These settings allow you to change the program interface, add the necessary panels and buttons, and change the display parameters of the requested pages. The article discusses how to configure various viewing modes, including turning off graphics, changing font size, changing the color and text encoding of the pages being viewed. From this article you will also learn how to set up the necessary privacy and security mode, how to operate certificates, how to select the folder size for storing temporary Internet files, determine the connection to a particular proxy server, and much more.

Customizing the Toolbar

First of all, let's turn to the point View control menu, which provides access to the most frequently used settings.

On the menu View you can add and remove panels as you wish (Fig. 1).

To add or remove buttons on standard toolbars, change their size and arrangement, run the command Toolbars à Setting, As a result, a panel will appear (Fig. 2), where you can change the icons.

On the menu View you can also customize various browser panels: Search, Favorites, etc. (Fig. 3).

Typically, Web site developers determine the size and style of fonts on the page. However, these settings may not be optimal for you. You can set your text display mode in your browser settings. To do this in the menu View point the mouse cursor at Font size and select the desired size (Fig. 4).

You've probably encountered a situation where, instead of page text, the browser produces a set of unreadable sequences of characters. In this case, you should check whether your browser has selected the correct encoding for this page. The Cyrillic (KOI8-R) and Cyrillic (Windows) encodings are often confused.

Most Web pages contain information that allows the browser to set the appropriate language encoding.

If there is no such information on the Web page, and the automatic selection function is configured in Internet Explorer, then the encoding will be selected automatically.

In order to enable the automatic encoding selection function, you need to go to the menu View Internet Explorer browser (Fig. 5) check the box Auto select.

If auto-select fails to determine the correct language encoding, but you know which encoding is needed in a particular case, you can select it manually using the command Additionally.

General Tab

in the tab Are common(Fig. 6) you can define the so-called “Home page”, that is, the page from which you will start viewing Web resources.

Temporary Internet files

As you know, to speed up browsing of pages that you have already visited, they are cached on your computer's hard drive and certain time are stored in the Temporary Internet Files folder. This storage arrangement speeds up the display of frequently visited Web pages, since the browser can open them from your hard drive, rather than requesting it a second time from the Internet.

To evaluate what resources are available directly from your computer, open the folder Favorites, run the command File à Work offline and pay attention to your panel Favorites. The names of sites that are not accessible offline will be grayed out, and those whose information is cached on your hard drive will be highlighted in black (Figure 7).

Obviously, the more space you provide on your computer for cached pages, the more likely it is that newly requested information will be stored on your disk. To increase your Internet cache, go to the tab Are common to section Temporary Internet files and select Options, as a result of which the panel of the same name will appear (Fig. 8), in which you can configure the maximum allowable size of the folder for storing temporary Internet files.

Increasing the space reserved for the temporary files folder may increase the likelihood of previously viewed Web pages being found in your computer's cache, but it will obviously reduce the amount of available disk space.

In the next wizard screen (Fig. 10), you can set the mode in which the subscription will also occur to those pages to which the base pages will link. Moreover, you can set the depth of links.

Next, you will be asked to select a page synchronization method (Fig. 11). There are two options: using the “synchronize” command or using a new schedule.

If you select the “new schedule” mode, the Wizard prompts you to determine the synchronization frequency and specify the synchronization time (for example, every day at 23:00).

Privacy Tab

Internet Explorer protects user privacy and security of personal identification information.

Internet Explorer privacy features include:

  • security settings that determine how cookies are processed;
  • Privacy alerts inform you that the Web site you are opening does not comply with your privacy settings.
  • ability to view the privacy policy of a P3P Web site (format for protecting user personal data - Platform for Privacy Preferences Project, P3P.

Due to RZR support, servers that collect information about visitors (primarily online stores) and ignore this format may be blocked.

The category of confidential information protected by P3P includes the user’s personal data: his real name, e-mail address, etc. Protected information also includes information about visited Internet resources, recorded in cookies.

To ensure compatibility with the P3P protocol, a Web resource must describe its privacy policy, that is, determine what information about users it records, how it stores it, and what cookies s creates. This description is formalized in accordance with the P3P specification and is placed in the root directory of the site. Internet Explorer reads this file and receives the necessary information.

The main channels for the leakage of confidential information are third-party sites (they are also called third-party sites), that is, sites that the user accesses in parallel with the site being viewed. A third-party site is any Web site that does not appear in your browser window. The Web site you are browsing may contain content from third-party Web sites, which in turn may use cookies.

Internet Explorer 6.0 has a default protection level that blocks cookies from third-party sites that:

  • are incompatible with P3P, that is, they have not declared their privacy policy;
  • request personal information without the user's explicit consent;
  • request personal information without the user's implicit consent.

To change your privacy settings, in the tab Confidentiality move the slider up to increase the level of protection and down to set a lower level of protection (Fig. 14). A description of the customizable modes is given in the table.

Please note that changing your privacy setting does not affect cookies already stored on your computer.

Clicking the button Additionally on the panel (Fig. 14), you will be redirected to a panel where you can define additional privacy settings: override automatic processing of cookies and define the mode for accepting first-party and third-party cookies (Fig. 15).

Security Tab

Internet Explorer divides the Internet into zones of different security levels, which allows you to assign the required level of protection to each Web site.

Local Intranet (Local Zone)

Typically, this zone contains all addresses that do not require a proxy server to access. The default security level for the Local Intranet zone is set to Medium. This will allow Internet Explorer to allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites that created them.

Internet Explorer's privacy settings let you control how cookies are handled for all Web sites or for each Web site individually.

Trusted nodes

The Trusted Sites zone has a low security level by default. Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites that created them.

Restricted Nodes

This zone is set to High security by default. Internet Explorer will block all cookies from Web sites in this zone.

Contents Tab

Access limitation

If you use a computer at home and are concerned that your children may view pages that you would like to restrict access to, you can resort to the settings located on the tab Content on the panel Internet Options(Fig. 19).

You can restrict access to thematic groups of sites or set a strict ban on access to specific sites.

It is quite difficult to protect a child from visiting all sites on a certain topic, but if you have information about specific sites to which you want to block access, it is naturally much easier to do this. For example, in the tab Allowed nodes you can specify a list of sites prohibited from viewing (Fig. 20).

Authentication problem

Authentication is the basis of secure communications. Users must be able to prove that they are who they say they are, while also being confident that their correspondents, in turn, are not impersonating someone else. This is more difficult to do online than in real life, primarily because we, as a rule, cannot personally meet with the partner providing this or that network service. However, even when you see your partner, the problem of identification does not disappear - that is why passports, driver's licenses, etc. exist. To authenticate partners on the Internet, you must have appropriate certificates. Before talking about the settings, let us recall the purpose of certificates.

Certificates

A certificate is a document proving the identity of the owner or the security of a Web site. It is a set of data that allows the correspondent to be identified. Certificates help protect your personal identity online and protect your computer from unsafe software.

An organization that has a high trust status can issue certificates that allow the public key to be associated with the identity of its owner. Such an organization is called a Certification Authority (CA), or certification authority.

Internet Explorer uses two types of certificates: personal certificates and Web site certificates.

A personal certificate is used to verify the identity of a user accessing a Web site that requires a certificate. A Web site certificate confirms its authenticity to those clients who turn to it for service.

A certificate certifying the “identity” of a Web site is needed, for example, when sending confidential information over the Internet to a Web site or when downloading software from a Web site.

The basis of authentication is public key encryption. A certificate matches an identifier to a public key. The corresponding private key is known only to the owner of the certificate, who uses it to digitally sign or decrypt data encrypted with the corresponding public key.

The digital signature specified in the certificate is the user's electronic identification, which tells the recipient that this information actually came from a specific correspondent and was not changed at the delivery stage. When a user accesses a secure Web site, the latter will automatically send the user its certificate. As a result, the user will receive a notification that the connection is secure and the data transmitted by the user will not be available to third parties (Fig. 21), and when requesting more detailed information from the IE browser, it will explain the mode of visiting a secure node (Fig. 22) .

To be able to send encrypted or digitally signed messages themselves, the user needs to obtain a personal certificate and configure Internet Explorer to work with it.

Verifying a website's certificate when downloading software

There may be several situations when it is important for you to know that the server with which you are going to exchange data belongs to exactly the company to which it belongs. Let's take a common example - buying or downloading free software from the Internet.

When you buy boxed software from a brick-and-mortar (non-electronic) store, you receive a sealed box of the product, so you can track whether the packaging has been tampered with and, in most cases, have no doubt about who made the software. It's a different matter when you download a product from the Internet. In this case, you do not know whether the supplier of this software is exactly who it claims to be, and whether the downloaded software does not contain viruses, is complete, reliable, etc.

This problem can be solved by introducing an authentication code (Authenticode) into the distributed product. This technology gives software developers the opportunity, through the use of a digital signature, to include information about the developer in distributed programs. When users download software signed with an authentication code and verified by a certificate authority, they can be confident that they are receiving software from the company that signed it and that the software has not been altered since it was signed.

Such a system is the basis for protecting consumer rights, for example in the event of viruses in the code. Based on code authentication, users can securely receive signed ActiveX controls, signed Java applets and other applications.

Software developers are also interested in authenticating the product distributed over the Internet, since this makes it more difficult to counterfeit their software.

Any company that wants to distribute software or content over the Internet needs a system like this.

Client Microsoft programs, such as Internet Explorer, Exchange, Outlook, Outlook Express, come with security systems that already include an authentication system for program code downloaded over the Internet. This is necessary primarily because the above systems are designed for replenishment from the Internet. Under the component model, elements such as ActiveX or Java applets can be downloaded to your computer when you view a Web site. When a user accesses a Web page that needs to play animation or sound, program code often uploaded to client machine to implement the required function. In this case, the user risks downloading a virus or other unsafe code. In order to protect the user, there is a system of signed applications.

If a user of the above client applications encounters a component distributed without a signature, the following will occur:

  • if the application security system is set to “High Security” mode, the client application will refuse to download the code;
  • if the application security system is configured to the “Medium security” mode, the client application will issue a warning (Fig. 23);
  • if, on the contrary, the user encounters a signed applet, the client program will issue a different message (Fig. 24).

Having received confirmation of the authenticity of the downloaded software, the user understands that, firstly, the software that he is about to download really belongs to the publisher, and secondly, he knows that authentication is provided by such and such a center, and knows where to get additional information in order authentication. In this session, users can trust the further download procedure. Users can also select “Always trust the download process from this publisher” to speed up the verification process in the future.

Users can always obtain additional information about the certificate (Fig. 25).

Installing publisher certificates

Certificate issuers create special, so-called root, certificates for themselves that confirm the authenticity of their private keys. Each specific type of certificate has its own root certificate: one for e-mail certificates, another for full personal certificates, and a third for servers. Browsers are usually released with a set of such certificates.

If, while browsing the Internet, you encounter a server with a certificate issued by an unknown issuer, you will be prompted to accept that certificate and, if it contains a root certificate from the same issuer, you will be given the option to install that certificate and assign actions to servers with certificates obtained from by this publisher.

Using digital certificates can keep your online transactions secure by linking the identity of the certificate owner to a key pair (public and private).

Obtaining a personal certificate

So far we have talked about the need for servers to prove their authenticity. However, in some cases, servers require confirmation of the client's identity. Therefore, now we will talk about personal certificates. There are several categories of reliability of certificates that are issued by independent certification authorities.

Personal certificates are used to verify a user's identity as required by some sites that provide a particular service. Certificates are issued by the same certificate issuers, that is, a third party trusted by both the user and the service operator.

To obtain a certificate, you must register with the certificate issuer of your choice.

Typically, to obtain a certificate, you need to provide the certificate issuer by mail, and sometimes in person, with certain documents, and then pay for the certificate.

The procedure for obtaining a certificate is as follows: you contact the certificate issuer's Web server, fill in the data required to obtain a specific certificate and select the length of the private key (preferably at least 1024 bits). Before submitting the form, your browser will generate a pair of keys - public (public) and private (closed) - and enter them into a password-protected database. The private key is known only to you - it should not be known to anyone else, including the certification authority. Against, public key is sent along with other entered data to the certification authority for inclusion in the certificate. Using a public key, it is impossible to determine its private key pair.

After issuing a certificate, the certification authority usually sends you the certificate or provides you with a URL where you can download it. After downloading the certificate from the certificate issuer, the browser automatically starts the installation procedure.

Installing and removing certificates

Internet Explorer has a certificate manager - Internet Explorer Certificate Manager (Fig. 26).

It allows you to install and remove client certificates and certificates of certification authorities, or, as they are also called, CA (from the English Center Authority). Many CAs already have root certificates pre-installed in Internet Explorer. You can choose any of these pre-installed certificates to verify the authenticity of the code, the authenticity of time stamped on documents, secure mail, etc. To install or remove certificates, go to the tab Content. Select an item Certificates, and then the corresponding tab. The following tabs are available: Personal, Other Users, Intermediate Certification Authorities, Trusted Root Certification Authorities, etc.

Certificates in category Personal have corresponding private keys. Information signed through personal certificates is identified by the user's private key. By default, Internet Explorer places all certificates that identify a user (using a private key) in the category Personal.

In the tab Trusted Root Certification Authorities Usually, root certificates are already preinstalled, which you can view and get all the information about them: who issued them, their validity period, etc. (Fig. 27).

By clicking on one of the certificates, you can get additional information about it, including the composition and certification path (Fig. 28).

Setting up a proxy server in Internet Explorer

As you know, modern browsers such as Internet Explorer and Netscape Navigator have internal cache settings that allow you to determine the amount of disk space on your machine that will be used to cache documents you have already viewed. The browser periodically updates the documents in the cache to keep them fresh. However, the cache size on a PC is usually small, since PC users rarely allocate more than a gigabyte of disk space for caching, so the volume of stored documents is small. It is difficult to allocate a large amount of memory on a local computer, but this can be done on the provider's proxy server - a computer running a special program that caches data requested by all clients of a given provider. Large providers can allocate tens or even hundreds of gigabytes to their clients. Some users are concerned, however, that by using cached documents from a proxy server they will receive outdated documents, but technology exists to avoid this.

There are a number of criteria by which the decision about caching on a proxy server is made. For example, if an object is marked as sensitive, then it will not be cached. Similarly, there are criteria by which a decision is made about the possibility of sending a cached document to a client request. For example, if a document has expired, the server will not send it to the client, but will request a fresh document. This way, fresh documents (not expired) are provided immediately, and if the proxy server has doubts that the document is fresh, it can ask the Web server whether the document has been modified. It is possible that the expired document is not actually out of date because it has not been updated, in which case the Web server will respond to the proxy server that the document has not yet “deteriorated” and can be provided upon the client’s request. In other words, there is every reason to use a proxy server.

To set up a connection through a proxy server, go to the tab Connections on the panel Internet Options(Fig. 32) and instead of the item Never use(which you probably had set up if you weren't working through a proxy) select Always use the default connection.

Then refer to point Settings, which will lead to the appearance of the panel shown in Fig. 32.

Check the box Use a proxy server for this connection and enter the proxy server address and port - these addresses should be obtained from your provider. I use the services of the Zenon company and in my case it is proxy.aha.ru. Next, go to Additionally(Fig. 33) and indicate One proxy server for all protocols.

It should be noted that working through a proxy server is not always optimal. The most obvious example is that if you can access a certain Web server faster than a proxy server, then there is no point in accessing through the proxy server. Or, for example, if you are debugging Java applets on some server and you need to constantly monitor how correctly your software, then, of course, you will not be satisfied with the download previous version applet. On the panel shown in Fig. 33 Additionally, Play video, causing pages to load faster.

After you have disabled the display of pictures and loaded the page, it will be displayed in a “truncated” form, as shown in Fig. 37. There will be icons instead of pictures. Clicking right click mouse on this icon, you can call context menu and view the required drawing.

ComputerPress 11"2002

After installing the Internet Explorer browser, you need to implement it initial setup. Thanks to it, you can increase the performance of the program and make it as user-friendly as possible.

General properties

The initial setup of the Internet Explorer browser is carried out in the section "Service - Browser Options".

In the first tab "Are common" You can customize the bookmarks bar and set which page will be the start page. Various information, such as cookies, is also deleted here. According to user preference, can be customized appearance using colors, fonts and design.

Safety

The name of this tab speaks for itself. Here you can set the security level of your Internet connection. Moreover, this level can be distinguished between dangerous and safe sites. The higher the protection level, the more additional features can be disabled.

Confidentiality

Here access is configured in accordance with the privacy policy. If sites do not meet these requirements, you can prevent them from sending cookies. Here you can also set a ban on location detection and blocking pop-up windows.

Additionally

This tab is responsible for configuring additional security settings or resetting all settings. There is no need to change anything in this section; the program automatically sets the required values. If various errors occur in the browser, its settings are reset to their original settings.

Programs

Here we can assign Internet Explorer browser default and manage add-ons, i.e. additional applications. From the new window you can turn them off and on. Add-ins are removed from the standard wizard.

Connections

Here you can connect and configure virtual private networks.

A very convenient feature of this section is family safety. Here we can adjust the work on the Internet for a specific account. For example, deny access to certain sites or, conversely, enter a list of allowed ones.

The list of certificates and publishers is immediately adjusted.

If you enable the autofill function, the browser will remember the entered lines and fill them in when the initial characters match.

In principle, the settings of the Internet Explorer browser are quite flexible, but if you wish, you can download additional programs that will expand standard features. For example, Google Toolbar (for searching through Google) and Addblock (for blocking ads).