Logo
PREGNANCY
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
 
 
Windows Vista

Maintaining Security : Maintaining High Security, Setting Internet Explorer Security

3/1/2013 4:45:56 PM

1. Maintaining High Security

Microsoft Windows Vista itself provides your computer with many built-in security features. However, as powerful as they are, by themselves these security features can’t protect you from every type of mischief that can occur. You need to be active in protecting your computer, your data, and your personal information.

Doing Your Part

Here are some things you can do to improve your security:

  • Log on using a Standard account instead of an Administrator account, and use the User Account Control to run individual items as an Administrator when required.

  • Make sure you have a good, up-to-date anti-virus program installed. This will add protection against viruses and worms that have figured out ways around some of the security features.

  • In Windows Mail (or the mail program you’re using), read your e-mail in plain Text format instead of using the HTML format. This will prevent any malicious code that’s hidden in the HTML code from being executed when you open the message.

  • In Windows Mail (or the mail program you’re using), don’t download pictures and other external HTML content contained on a server unless you trust the source. Doing so verifies your e-mail address to potential authors of spam and can introduce malicious code.

  • Make sure that your Web content zones in Internet Explorer are properly set and that you’re not using custom settings that provide less protection than the recommended default levels.

  • In Internet Explorer, make sure you have the pop-up blocker turned on to prevent code from being loaded, to prevent a hacker from stealing information by making the pop-up look like a dialog box or other content that asks for information, and to keep those annoying pop-up ads from appearing.

  • In Internet Explorer, make sure you have the phishing filter turned on to identify illicit Web sites that look legitimate but are designed to steal your information.

  • In Internet Explorer, work in Protected mode so that Internet Explorer activities and downloads are isolated from the rest of your computer.

  • Keep Windows up to date with automatic updates. Each critical update is an urgent fix to outmaneuver a newly detected software vulnerability.

  • Use the Windows Security Center to verify that your basic security settings are properly configured and up to date.

  • Stop and think before you do something you might regret: open an attachment, download a file, install a program, or even answer an e-mail message.

  • Keep all your important data backed up so that if something nasty sneaks past all your security, you can recover all the data.

Complicated? Absolutely! But don’t be intimidated: Windows Vista is designed to be as secure as possible and will take care of most security issues. It also adjusts many of your default settings to maintain the optimum balance between security and functionality. And it monitors your security status and alerts you when there’s a problem.

2. Setting Internet Explorer Security

Although most Web sites pose little security threat to your computer, some sites are designed with malicious intentions. In Internet Explorer, to protect your computer from these sites—and to allow access to additional features for sites you know won’t cause any harm—you can set and customize your own security levels and can add sites to your list of trusted or restricted Web sites.

Set Your Security

1. In Internet Explorer, click Tools, choose Internet Options from the drop-down menu, and click the Security tab of the Internet Options dialog box.

2. Click the Trusted Sites zone, click the Sites button, and type or paste an address for a Web site you trust and to which you want full access.

3. Click the Restricted Sites zone, click the Sites button, and type or paste an address for a Web site you believe might be dangerous and from which you want maximum protection.

4. Click in a zone, and do either of the following:

  • Use the slider to adjust the level of security. If the slider isn’t visible, click the Default Level button, and then use the slider.

  • Click Custom Level, and select the options you want in the Security Settings dialog box. Click OK.

5. Select this check box, if it isn’t already selected, to use Protected mode.

6. Repeat steps 4 and 5 for each of the zones, and click Apply.

7. On the Privacy tab, set the privacy level you want to control the types of cookies that are stored and that contain and/or collect information about you.

8. Click OK.

Other -----------------
- Maintaining Security : Restricting Access on the Computer
- Preparing Windows PE : Setting up the Environment
- Preparing Windows PE : Exploring Windows PE
- Planning Deployment : Starting Deployment Workbench, Updating BDD 2007 Components
- Planning Deployment : Installing BDD 2007
- Planning Deployment : Preparing for Development
- Planning Deployment : Planning Low-Volume Deployment, Windows Vista Requirements
- Using BDD 2007 for Deployment Planning
- Developing Disk Images : Manually Preparing Images, Customizing BDD 2007
- Maintaining Security : Authorizing Administrative Actions, Restricting Access to Web Content
- Maintaining Security : Monitoring Your Security Settings, Configuring the Windows Firewall
- Developing Disk Images : Capturing a Disk Image for LTI, Capturing a Disk Image for ZTI
- Developing Disk Images : Creating the Lab Deployment Point
- Adobe Illustrator CS5 : Organizing Your Drawing - Working with Groups
- Adobe Illustrator CS5 : Organizing Your Drawing - Enhancing Appearances with Live Effects
- Adobe Dreamweaver CS5 : Working with Multimedia and Online Tools - Checking for Plug-ins
- Adobe Dreamweaver CS5 : Working with Multimedia and Online Tools - Using Plug-ins
- Adobe Dreamweaver CS5 : Working with Multimedia and Online Tools - Using ActiveX Controls
- Maintaining Security : Restricting User Rights, Protecting Your Account
- Maintaining Security : Setting Your Password, Changing Your Password, Resetting Your Password
 
 
Most view of day
- Working with the User State Migration Tool (part 2) - Setting Up the Source Computer
- Sharepoint 2013 : Understanding Service Applications - A History of Service Applications in SharePoint
- Microsoft Content Management Server : Preventing Pages with Invalid Content from Being Saved
- Planning Deployment : Preparing for Development
- Windows Live Services That Make Windows 7 Better (part 1)
- Microsoft Visio 2010 : Creating and Using Shape Data Fields (part 5) - Shape Data Labels versus Names
- Microsoft Dynamics AX 2009 : Form Customization (part 1) - Learning Form Fundamentals
- Microsoft Excel 2010 : Protecting and Securing a Workbook - Setting Macro Security Options
- Windows Server 2008 R2 high-availability and recovery features : Installing and Administering Failover Clustering (part 8) - Administering a Failover Cluster
- Microsoft Dynamics CRM 4 : Digital Phone Integration (part 2) - Cisco Unified CallConnector for Microsoft Dynamics CRM
Top 10
- Sharepoint 2013 : Working with the CSOM (part 6) - Working with the JavaScript client object model - Creating, reading, updating, and deleting in the JavaScript client object model
- Sharepoint 2013 : Working with the CSOM (part 5) - Working with the JavaScript client object model - Handling errors
- Sharepoint 2013 : Working with the CSOM (part 4) - Working with the JavaScript client object model - Returning collections
- Sharepoint 2013 : Working with the CSOM (part 3) - Working with the managed client object model - Creating, reading, updating, and deleting
- Sharepoint 2013 : Working with the CSOM (part 2) - Working with the managed client object model - Handling errors
- Sharepoint 2013 : Working with the CSOM (part 1) - Understanding client object model fundamentals
- Windows Phone 8 : Configuring Mailbox Settings (part 5) - Configuring Automatic Replies
- Windows Phone 8 : Configuring Mailbox Settings (part 4) - Lightening the Display,Changing the Mailbox Sync Settings
- Windows Phone 8 : Configuring Mailbox Settings (part 3) - Message Signatures, Blind CCing Yourself
- Windows Phone 8 : Configuring Mailbox Settings (part 2) - Unlinking Mailboxes, Conversation View
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro