Internet Explorer


Uploaded by itfreetraining on 03.08.2011

Transcript:
Welcome back to IT Free training free windows 7 training course. In this video I will look
at internet explorer 8 which is shipped with windows 7.
Internet explorer has been around since Windows 95 days and has continued to grow and change
with the ever changing internet. Because of this, compatibility problems are bound to
occur when you look at web sites which were designed to work with earlier editions of
windows.
The default view in internet explorer is standard mode. In standard mode some web pages may
not appear correctly. This is for a number of reasons. Microsoft have done a lot of work
to make internet explorer adhered to the current h t ml standards. However by doing this, they
have also fixed a number of bugs or tighten up the code to follow the standard. Web pages
that rely on these bugs or internet explorer specific way to display pages may not display
correctly with internet explorer 8. Also new features in internet explorer may cause problems
with old web pages. When this occurs you can enable compatibility
mode. If I open my web browser to the CNN web site. At the top of the screen you can
see and icon. Selecting this icon will enable compatibility mode and cause the web site
to reload. If I go to the Google web site, you will notice
the icon is not present. Compatibility mode will automatically appear when internet explorer
thinks it may be needed. If I go to tools and select the option compatibility view settings,
I can change when compatibility mode is used. By default, compatibility mode will use a
list supplied by Microsoft of web sites that have known display problems. Also notice that
any web sites that internet explorer thinks are intranet web site will automatically be
displayed in compatibility view. Intranet web sites are web sites that are generally
only available to a company’s internal workers. Lastly you can select to enable compatibility
mode for all web sites. Doing this also disables the new features in internet explorer 8 so
I would only do this if you are really having problems. Notice that CNN was automatically
added to the list when I selected compatibility mode. This means CNN will always use compatibility
mode until you remove it. For this reason I would only add in web sites that you are
having problems with. You may think that given time, the majority
of web site will be updated. However, things like help manuals stored in read only media
like D V D may never be updated. For this reason Microsoft has introduced a new H T
M L tag. The developer of the web site only needs to add this tag to their web site and
the web site will always be displayed in compatibility mode. This is great for the end user since
they will not have to do anything on their end to have the web page displayed correctly.
There are also 6 group policy settings for compatibility mode. These are located in administrative
templates, windows components, internet explorer and compatibility view. The first one, turn
on internet explorer 7 standards mode, when enabled will view all web sites as if you
were using internet explorer 7. The next option turns off compatibility mode
meaning the user will not be able to use or make changes to compatibility mode. If you
enable the next option, turn on internet explorer standards mode for local intranet, standard
mode will be used for all intranet web sites. In other words, compatibility mode will be
disabled for intranet sites. The next option disables the compatibility
view button. Compatibility mode will still operate, but the users will not be able to
enable it by pressing the compatibility button in the task bar. The next option, includes
updated web site lists from Microsoft, will automatically enable compatibility mode when
the web site being visited is on Microsoft list of known web sites with compatibility
problems. The last group policy setting lets you create
a list of web sites that will always be viewed in compatibility mode. That’s it for the
compatibility settings. Next I will look at security zones.
When you visit a web site, internet explorer will classify the web site into one of four
zones. The zone will determine which security settings will be applied to that web site.
To configure security zones, first I you need to launch internet explorer. From the tools
menu select internet options. To configure zones I need to select the security tab. On
the security tab you can see the 4 zones in internet explorer. The first zone is internet.
The internet zone is the default zone and is used when the web site does not match any
of the other 3 zones. The next zone in local intranet. This zone is used for web sites
that are inside the local company. Internet explorer will generally detect these sites,
but you can add them yourself if it does not detect them correctly.
The zone trusted zone is designed to allow web sites to run with few restrictions. Generally
you would add sites in here that have security problems with but trust not to have malware
that may damage your computer. The last zone is restricted zones. Sites you
put in this zone are potentially dangerous. This zone has the highest security of any
zone. If you need to put a site in here then it is probably a site that you should consider
not visiting. However, if you really need to access that site, add it to this zone.
By default, each zone is given certain security settings. Here you can see a slide bar which
determines which settings are used. Where you place the slide bar changes a heap of
other settings, however if you want to customize the options you can select the option custom
level. This will show all the security settings.
If you were having problems with activex controls for example, you may want to change the settings
for them. There are a lot of settings in here, for example down the bottom you can change
how user logon are treated. If you ever make a mistake and want to go back, you can press
the reset button to go back to the defaults. If I cancel out now and go back to the security
tab, I can select local intranet zone to see the setting for this zone. Internet explorer
will automatically attempt to classify sites that it thinks are intranet sites into this
zone. If you want to see which sites it will always put into the zone press the button
sites. To add your own sites press the advanced button.
Internet explorer should by default pick up sites that are on the same network as the
computer as intranet sites. However sites that are separated by wide area networks or
sites that are hosted by a different company but considered to be an intranet site, for
example if the company acquires anther Company, can be added in here.
If I exit out of here, I can select the next zone trusted zones. Generally this zone is
used for sites that you trust but may be having problems with. For example, perhaps they used
activex controls. It is better to add the site you are having problem with in here to
get it to work, rather than changing the security setting of the internet zone.
To add a site, select the button sites. At the bottom there is a tick box that requires
the site to be a secure site before it can be added. It is recommended that you only
add secure sites to trusted sites however you can bypass this requirement if you need
to. When I exit out of here, notice the option
down the bottom, enable protected mode is not selected for this zone. When protected
mode is enabled, the internet explorer process runs with restricted permissions. The reduced
permissions stop the internet explorer process from doing things like writing to the hard
disk. Previously if there was a bug in internet explorer, a hacker could use this bug to access
the hard disk of the computer. With protected mode on, if there is a bug in internet explorer
and a hacker attempts to access the hard disk using this bug, protected mode will block
the attempt. However, protected mode can also stop software from running that could be run
with previously versions of internet explorer. If this occurs, you may need to add the web
site to the trusted sites. The last zone is restricted sites. This site
has the most restrictions of any zone. If you need to visit a site that has malware
on it, you should add it to this zone. Having said that, if possible you should avoid visiting
sites like these, however sometimes you may not have a choice.
There are only a few more features of internet explorer that I want to go though. To demonstrate
these I will switch to my windows 7 computer. Firstly you may want to add additional components
to internet explorer in the form of add ons. To do this, open internet explorer and go
to the tools menu. From the tools menu select manage add-ons.
Manage add ons is divided into four sections. The first section contains all the toolbars
and extensions. If you want to install more toolbars you can select the option at the
bottom of the screen find more toolbars and extensions.
Currently there are no toolbars shown. If I select the show “pull down” it is currently
set to show only loaded add-ons. Notice also the option for showing toolbars that run without
permission and finally downloaded controls. Manage add-ons also includes other items other
than toolbars. The next option will show you all the search providers that are installed.
Currently there is only one installed, however just as before, I can select the option find
more search providers at the bottom to add more.
Search providers don’t only just include the traditional internet search engines likes
Google. You can also add search provides for ebay, Wikipedia and Amazon to name just a
few. Once you know what you want you want press the button add in internet explorer.
Once selected, you also have the option to make this search provider the default search
provider. Notice all so you have the option to use search suggestions from this provider.
Some of the search engines record what you search for and thus when you search for items
in the future, they can provide suggestion based on that information and hopefully give
you search results that you want. The next option is accelerators. Accelerators
as the name suggest speed up the process of doing things. Traditionally you may need to
copy and paste text into a dialog box in order to process it. Using an accelerator you simply
select the text and it o the accelerator for processing.
You can see some defaults ones have been installed, but you can always add more. The last option
is in private filtering. A lot of web sites use content from other webs when you view
a page. The most obvious type of this content is internet advertising. In private filtering
tracks content that is displayed on many different web sites. Companies can use this content
to work out surfing patterns from users. Usually this is in an attempt to give you ads that
you may be interested in. If you don’t want companies to gain statistical information
about your web surfing, have a look at in private filtering.
To see the changes that I have made, I need to close internet explorer and reopen it.
At the top right of internet explorer the default search engine has changed to Google.
The next feature I want to demonstrate is an accelerator. If I open the CNN web site
for example. A translator accelerator is installed by default
in internet explorer. If I select the text I want to translate, right click it and select
translate with bing, I will get a dialog asking what language to translate it to. In this
case I will choose Greek. Previously you would have to copy and paste the text to translate
it. Accelerators are designed to remove a few mouse clicks to speed up the process.
The next option I want to show you is in private browsing. To open an in private browser right
click internet explorer and select start in private browsing. An in private browser window
will now open. When using a private browser window, all your cache, cookie etc are automatically
deleted when you close the browser. It is basically designed so that the next person
using the computer won’t know what you were looking at. For example, in private browsing
is good feature to use when buying people gifts so they won’t be able to go through
your browsing history and work out what you are going to buy them.
I also like to use in private browsing when using an internet kiosk. For example, if I
use the kiosk to log in to hot mail. Now I don’t have to worry about signing out when
I finish. As long as I close the in private internet explorer window after wards, no one
will be able to hi jack my session if they use the computer after me. Also in private
browsing is equally good for internet banking. There is one trick that I like to do with
in private browsing which I don’t think they had in mind when designed it, but it
works really well. If change back to my none in private browser window, you will notice
that I can login into hot mail again as anther user. If you have 2 e-mail accounts this is
one way you can access both at the same time. Also I like to do this when editing web pages.
When you log into a web site you will see the web site as a logged in user. When I make
changes and I want to see the web site as a guest, I simply open an in private browsing
windows and this will show me the web page as an anonymous user. Not what in private
browsing was designed for, but a very useful feature that saves me logging out and back
in when I want to see changes to my web page. This concludes the internet explorer video.
In the next video I will look at the internet protocol the mostly widely used network protocol
in the world and the foundation of most networks. Remember to have a look at our web page for
more free products including exam questions and study guide. Thanks for watching.