Internet Explorer anti-black top 10 tips

Source: Internet
Author: User

There are many malicious modifications and attack methods against IE. the ten anti-Black techniques described in this article will certainly help you.

1. Manage cookies

In IE6.0, open the "Tools"> "Internet Options"> "privacy" dialog box, the following six levels are set: "block all cookies", "high", "medium", "medium", "low", and "accept all cookies" (the default value is "medium "), you only need to drag the slider to easily set the URL. Click the "edit" button at the bottom and enter a specific URL in "website address, you can set it to allow or deny them from using cookies.

2. Disable or restrict the use of Java programs and ActiveX Controls

Java, Java Applet, and ActiveX scripts are often used on webpages. They may obtain your user ID, IP address, and password, some programs or other operations may even be installed on your machine. Therefore, restrictions should be imposed on the use of Java, Java Applet scripts, ActiveX controls, and ins. Enable "Internet Options"> "security"> "Custom Level ", you can set "ActiveX Control and plug-in", "Java", "script", "Download", "user verification", and other security options. Some unsecure controls, plug-ins, and download operations should be prohibited and restricted. At least prompt should be given.

3. Prevent Information Leakage

By default, after you use the user name and password of the Web address, form, and form for the first time, you agree to save the password. The next time you enter the same Web page and enter the password, you only need to enter the start part, and the subsequent parts will be automatically completed, which brings convenience to users, but also leaves security risks, however, we can adjust the settings of the "auto-completion" function. The setting method is as follows: click "Internet Options"> "content"> "auto complete" in turn, open the "auto complete Settings" dialog box, and select the "auto complete" option to be used.
Reminder: to ensure security, you should regularly clear historical records to prevent information leakage, in the "Automatically complete Settings" dialog box, click "clear form" and "Clear password.

4. Clear the browsed URLs

In the Internet Options dialog box, under the General tab, click the Clear history button in the History area. If you only want to clear some records, click the "History" button on the IE Toolbar. In the address history on the Left bar, find the address you want to clear or its webpage, and right-click it, select "delete" from the shortcut menu ".

5. Clear web pages that have been visited

To speed up browsing, IE automatically saves the web pages you browsed in the cache folder "C:/Windows/Temporary Internet Files. When you confirm that you no longer need to browse the Web page, select and delete all the web pages here. Or, under the "General" tab of "Internet Options", click the "delete file" button in the "Internet temporary files" project, in the "delete file" dialog box that appears, select "delete all offline content" and click "OK". This method leaves a few cookies in the folder, for this reason, IE6.0 adds a "delete Cookie" button next to the "delete file" button, which allows you to easily Delete legacy files.

6. Never fear that the IE homepage address will be modified

As we all know, modifying the default IE homepage address is a common method for malicious web pages. After IE is modified, it automatically connects to the address of the malicious webpage. The common method is to modify the Registry. In fact, as long as you simply add a parameter to IE, it will no longer harm the Homepage Address of javase to be modified. The following describes the specific methods and steps.
First, open "my computer" and find the installation directory of IE. Assume that your IE is installed under C: Program FilesInternet Explorer. The shortcut of the hosts file. If you are careful enough, you will find that you have set up this parameter, which is called "ipolice.exe", and the original IE shortcut name on the desktop is "Internet Explorer". The two names are not only different, but also different in meaning.
After continuing our work, use the mouse button on the right to click the option, select "shortcut", and then select the "shortcut" tab in the "iexplore.exe properties" dialog box. Then, in the "target" box, enter "C: Program FilesInternet ExplorerIEXPLORE. EXE "-nohome, Add the parameter"-nohome "to iexplore.exe. when entering the parameter, please note that there is a space before the parameter"-nohome ". Do not forget that the input is complete. Click "OK" to exit.
In this way, even if the home page is modified, it does not matter. Opening IE is blank, and even about: blank is not displayed. In addition, this can speed up the startup, and an IE window will pop up immediately.
We cannot add the preceding parameters to the shortcut created by IE during installation. If you do not believe it, right-click the shortcut created by IE on the desktop and select "attribute ", the "target" column, "Start position" column, "shortcut key" column, and "running mode" column are unavailable in gray. This is the biggest difference between them! It is also the key of this article.

7. Dig out IE Local Security Configuration Options

In IE, you can click "Tools> Internet Options> Security" to set the computer security level, which will appear later. We can see that in security settings, we can only set the Internet, local Intranet, trusted sites, and restricted sites. However, Microsoft, who is used to hiding some of its functions (I really don't know what Microsoft thinks, I used to play "hide and seek" games with us), left another hand here: in fact, there is also a hidden option-"My Computer" Security Settings. If you want to see it, you can modify the Registry to achieve the goal.
The following is a specific method: Unlock. Open the Registry Editor and click "+" to expand to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZones. In the right window, find the DWORD Value "Flags ", the default key value is hex 21 (decimal 33). Double-click "Flags" and change its key value to "1" in the pop-up dialog box to close the registry editor. You do not need to restart your computer, re-open IE, and click the "Tools> Internet Options> Security" tab again, and you will see an additional "my computer ", you can configure the local security of IE.
What is the purpose of this tips? Save the following code as an html file and run it:
Running the preceding html file will open the calc.exe file under the c:/winnt/system32 file in your computer! And there is no prompt for IE! Even if you disable ActiveX control in IE security settings, the above Code can work! What if it is not a calc.exe file but other malicious files? What if your webpage contains code similar to the above? Dangerous!
This is because there are two terrible vulnerabilities in IE: attackers can execute arbitrary commands locally and the ActiveX security settings of IE can be bypassed. In the above Code, we specify a control number ("clsid: 88888888-8888-8888-8888-888888888888) that does not exist in the system for IE ), IE will try to download and install the modification control from the address specified by codebase. According to codebase, IE finds c:/winnt/system32/calc.exe, and then IE starts to "Download" and install the program. Since calc.exeis an EXE file, this is equivalent to running the file. Therefore, calc.exe is run!
So why does the Internet Explorer not prompt users during the "download and install controls" process, nor apply restrictions in the IE security settings for detection? This is because the ActiveX security settings of IE can be bypassed! The main reason is that IE security settings are for non-local pages or interactions, and IE is the most trusted for local security settings. If you note that the security settings of IE are for WEB servers on the Internet and Intranet, there is no security settings for local files. In summary, IE adopts the principle of maximum Trust in local security.
The solution is the trick we mentioned at the beginning: dig out the local security configuration options of IE, that is, modify the "my computer" settings in the IE security settings, disabling ActiveX download is all right. Right-click the mouse and choose to send a shortcut to the folder on the pop-up menu. In this way, an iexplore.exe file shortcut is created on the table. If you are careful enough, you will find that you have set up this parameter, which is called "ipolice.exe", and the original IE shortcut name on the desktop is "Internet Explorer". The two names are not only different, but also different in meaning.
After continuing our work, use the mouse button on the right to click the option, select "shortcut", and then select the "shortcut" tab in the "iexplore.exe properties" dialog box. Then, in the "target" box, enter "C: Program FilesInternet ExplorerIEXPLORE. EXE "-nohome, Add the parameter"-nohome "to iexplore.exe. when entering the parameter, please note that there is a space before the parameter"-nohome ". Do not forget that the input is complete. Click "OK" to exit.
In this way, even if the home page is modified, it does not matter. Opening IE is blank, and even about: blank is not displayed. In addition, this can speed up the startup, and an IE window will pop up immediately.
We cannot add the preceding parameters to the shortcut created by IE during installation. If you do not believe it, right-click the shortcut created by IE on the desktop and select "attribute ", the "target" column, "Start position" column, "shortcut key" column, and "running mode" column are unavailable in gray. This is the biggest difference between them! It is also the key of this article.

8. Open the "Internet properties" window under DOS

Sometimes some malicious web pages cannot be opened in the Internet Properties dialog box of IE. In this case, enter RunDll32.exe shell32.dll and Control_RunDLL inetcpl in the DOS window. cpl command to open the Internet Properties dialog box of IE. Note that the case of "Control_RunDLL" and the comma (,) before it should not be forgotten. RunDll32.exe is a Windows dynamic link library (DLL) management tool that can be used to execute a function (or function module) in the dynamic link library under the command line ).
RunDll32 is used as follows: RunDll32.EXE. Pay attention to the following points:
① Dllname (that is, the location and file name of the DLL Dynamic Link Library) cannot have spaces directly;
② Dllname and entrypoint can only be separated by commas (,). There cannot be spaces after commas (,). If an error occurs here, you will not receive any prompt;
③ Optional arguments dynamic link library calls the parameter. this parameter is case sensitive and should not be written incorrectly.

9. Remove the password for the classified IE Review

Sometimes, our IE will be changed to a hierarchical review password. Once a hierarchical review password is set, it will be useless even if IE is re-installed. What should we do? Do you want to format the hard disk? Never! Here I have a good way to help you solve this problem.
Go to the Registry and find HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionpoliciesRatings. Here

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.