8.Browser and Security Configuration(Part 2)

Embed Size (px)

Citation preview

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    1/19

    BROWSER AND SECURITY CONFIGURATION

    REMAINING PORTION

    Disabling Scripting Support in Windows 2000

    The WSH is installed and enabled by default on Windows 2000, XP,and Me systems. To disable this function, the VBS support must bedeleted from the system. Use the following steps to disable supportfor VBScripts by removing the WSH from a Windows 2000 PC:

    STEP 1

    Log on to the PC as an administrator.

    STEP 2

    On the desktop or from Windows Explorer, double-click the MyComputer icon to open the My Computer window. In the MyComputer window, open the Tools menu and select Folder Options.

    1

    http://coursewarehandler.onimageclick%28%27next%27%29/
  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    2/19

    STEP 3

    Choose the File Types tab. In the list of registered file types, lookfor VBScript Script File. If you can't find this, you have nothing toworry about, and you can click the Cancel button until you return tothe desktop.

    STEP 4

    2

    http://coursewarehandler.onimageclick%28%27next%27%29/http://coursewarehandler.onimageclick%28%27next%27%29/
  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    3/19

    SHOW ME

    1. go to my computer.

    2.go to tools

    3

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    4/19

    3. go to folder options

    4. go to file types

    4

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    5/19

    5. then this screen will come

    6. scroll down to vsb script file

    5

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    6/19

    7. click on delete

    8. then click on yes

    6

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    7/19

    9. then click on close

    7

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    8/19

    10. Now you are done

    PROXIES

    A proxy server saves you time and saves your employer or yourschool money by reducing the number of times that requests fordata are sent to the Internet. A proxy server temporarily cachesmost downloaded files and later provides these files to users insteadof sending each individual request out on the Internet.

    Configuring a Proxy Server in Internet Explorer

    8

    http://coursewarehandler.onimageclick%28%27next%27%29/
  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    9/19

    The following steps can be used to configure the proxy settings inInternet Explorer:

    STEP 1

    Open Internet Explorer, and choose Tools Internet Options. ClickInternet Options to continue.

    STEP 2

    From the Internet Options window, choose the Connections tab.Click Connections to continue.

    9

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    10/19

    STEP 3

    10

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    11/19

    Determine the option that corresponds to the way in which the PCconnects to the Internet, and then click either the Settings button inthe Dial-Up and Virtual Private Network Settings section or the LANSettings button in the Local Area Network (LAN) settings area. Inthis example we'll configure a proxy server on a LAN connection.Click LAN Settings to continue.

    STEP 4

    11

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    12/19

    In the Local Area Network (LAN) Settings window, find the Proxyserver area and select the Use a Proxy Server check box.If the Bypass Proxy for Local Addresses check box is unselected,leave it that way or check with your network administrator todetermine how it should be set. Click Use a proxy server tocontinue..

    STEP 5

    Click the Advanced button in the Proxy server area to open theProxy Settings window. Click Advanced to continue

    12

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    13/19

    STEP 6

    At this point, either an ISP or the local network administrator mustprovide information for what to insert in the various protocol boxes.You can check the Use the Same Proxy for All Protocols box, butyou must enter a proxy server URL (Universal Resource Locator) inthe HTTP box and enter the port that is assigned to the proxy in thePort box.

    Click OK to return to the previous window, and click OK until youare returned to the browser. You should close the browser andrestart it before attempting to test these configurations.

    NOTE

    A similar concept can be used on an individual PC using features built into

    most of the popular Internet browsers. Microsoft Internet Explorerincludes settings that allow the user to retain all, portions, or none of thefiles downloaded to the PC so that a Web page's data doesn't need to beretrieved from the Internet each time its Web site is visited. The files heldby Internet Explorer are stored in a folder named Temporary InternetFiles

    13

    http://coursewarehandler.onimageclick%28%27next%27%29/
  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    14/19

    CONFIGURING BROWSER SECURITY SETTINGS

    The basis for security in the Internet Explorer Web browser softwareis its security zones. You can assign any site to any of the foursecurity zones that are defined by Internet Explorer, and you canpermit or restrict the assigned site as you set up each zone. Todefine security zones, choose Tools Internet Options, then click the Security tab.

    14

    http://coursewarehandler.onimageclick%28%27next%27%29/http://coursewarehandler.onimageclick%28%27next%27%29/
  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    15/19

    The four security zones defined by Internet Explorer are asfollows:

    Local intranet: - This zone contains connections that are

    made on the local network or intranet. These sites aretypically identified by computer names or URLs that bypassthe proxy server or are located on the host PC. The defaultsecurity level of this zone is medium or Low.

    Trusted sites: - This zone includes Web sites that youhave indicated are safe to trust. By default, no Web siteclasses are defined in this zone, and its security level is setto Low.

    Restricted sites: - This zone is where Web sites that youdon't trust end up. You may have reason to believe that

    these sites will harm your PC and its resources. This is sortof the penitentiary for rogue Web sites. By default, no sitesare assigned here, and the security level is High.

    Internet: - A Web site that is not included in any of theother zones is assigned to this zone. Security is set to Low,and no sites are assigned here by default.

    You have the option of assigning one of three security levelsto each of these zones: High security, Medium security, andLow security. You can also define your own security level by

    combining various aspects of a security level. The Customsecurity level dialog box is shown here.

    15

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    16/19

    Think About It

    The Windows Scripting Host (WSH) enables Visual Basic (VBS)scripts including viruses to run on Windows computers. Matcheach Windows version to the correct installation method.

    (1) WSH is installed with the OS by default.(2) WSH is installed with Internet Explorer.

    (A) Windows 98

    (B) Windows 2000

    ANSWER IS (1= B and 2= a)

    WSH is also installed in a few other instances on Windows 98. Inany case, it is highly likely that WSH is installed on a Windowscomputer.

    SECOND QUESTION

    16

    http://coursewarehandler.onimageclick%28%27next%27%29/
  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    17/19

    Pages a user views on the Internet are stored on the proxyserver via the Windows Internet Explorer Temporary Filesfeature.(A) True(B) False

    ANSWER IS false

    That's right. A proxy server stands between a user's computerand a network (such as the Internet) and retrieves files for theuser. Windows Temporary Files is a directory on the user'scomputer where all the files ever downloaded to the browser arestored.

    THIRD QUESTION

    Click the correct option. Where do you click to set up a

    17

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    18/19

    ANSWER IS :- SO CLICK ON CONNECTIONS

    The Connections tab contains information about proxy serverconnections. Click Connections to continue.

    FOURTH QUESTION

    Match each Internet Explorer security zone to its defaultsecurity setting.

    (A) Local intranet(B) Trusted sites

    (C) Restricted sites(D) Internet

    1. LOW2. HIGH

    ANSWER IS

    18

  • 8/8/2019 8.Browser and Security Configuration(Part 2)..........

    19/19

    The correct sequence is 1, 1, 2, 1. The only zone that contains anyWeb sites by default is the Local Intranet zone, which includes siteslocal to the network or computer (and which in some cases is set toMedium by default).Trusted sites includes Web sites that you have indicated are safe totrust. Restricted sites are those you've indicated it's not safe totrust. All other Web sites not included in any of the other zones are

    assigned to the Internet zone, where security is set to LoW.

    SUMMARY

    In this lesson, you learned about browser security and proxysettings. You learned how to disable the Windows Scripting Host inWindows 98 and Windows 2000, which significantly reduces the riskof getting a virus. You also learned how to configure a browser toconnect to a proxy server, and how Internet Explorer TemporaryFiles mimic one function of a proxy server.

    Finally, you learned how to configure Security Zones in InternetExplorer. Trusted sites includes Web sites that you have indicatedare safe to trust. Restricted sites are those you've indicated it's notsafe to trust. It's also important to remember that all other Websites not included in any of the other zones are assigned to theInternet zone, where security is set to Low by default.