Optimization settings for Internet Explorer for the security of six killer Systems

Source: Internet
Author: User
Tags website server

1. Temporary Files

During Internet access, IE automatically keeps the browsed images, animations, Cookies, and other data in the system disk on the computer, this aims to facilitate the next visit to the webpage to quickly call files already saved on the hard disk, thus accelerating the Internet access.

However, after a long period of surfing the internet, you will find that the size of the Temporary Folder is getting bigger and bigger, which may easily lead to the generation of disk shards and affect the normal operation of the system. Therefore, we can consider moving the path of the temporary file to reduce the burden on the system, and to quickly restore the temporary file after the system is reinstalled. To open IE, click "Tools"> "Internet Options"> "Temporary Internet Files"> "Settings ", select the "Move folder" command button and set the path of drive C, and then set the size of the Temporary Folder based on the size of your hard disk space.

2. History

To help users remember the websites they visited, IE provides the function of memorizing all the websites that users log on to the Internet. Although this memory function can help a few people remember the website, I believe this is another evidence of Microsoft's infringement of user privacy. Think about it. When someone looks at your history, when the website address you visit is hidden, someone else can see it ...... Therefore, I want to clear the history! Similarly, click "Tools"-"Internet Options" to find the "History" at the bottom ", you can enter a number based on your preferences to set the "Number of days in which the web page is retained in the History" (I set it to 1, and a good website can be added to favorites ), or press the "Clear history" button and confirm it. Then let the history record Never come back.

3. Automatic completion

When a friend first uses a mailbox or applies to become a user of website X, the system will pop up a dialog box after entering the user name and password for the first time. Ask if you want to save the password. If you select "yes", you only need to enter the user name instead of the password (the password is provided by IE's Automatic completion function ). However, there is also a vulnerability, that is, if a user does not automatically complete the process of entering IE, which is the first letter of the user name, the user does not need to enter the password and therefore has access permissions. The auto-completion function of IE is set as follows: When IE is working, click "Tools"-"Internet Options"-"content" on the menu bar ". Click "auto complete" in the personal information. You can set the auto-completion function range: "Web address", "form", and "user name and password on the form ". You can also remove the automatically completed password and related permissions by clearing the password and form. We recommend that you clear related records when surfing the Internet in an Internet cafe.

4. Script settings

Java, Java Applet, ActiveX, and other programs and controls provide wonderful special effects for Friends When browsing the website. At the same time, some unscrupulous network spoilers aim to achieve their evil purpose, attackers often add malicious Java scripting languages or embed malicious controls to webpage source files. In this way, information is illegally stolen and security risks of accessing the Internet are caused to friends. How can we avoid these problems? When installing a genuine firewall, we should also restrict the control and plug-in of scripts and ActiveX such as Java and javascript to ensure security. On the IE menu bar, choose tools> Internet Options> Security> Internet> Custom Level, and set the settings. Here, you can select security options such as "ActiveX controls and ins", "Java", "script", "Download", and "user verification", such as "enable ", "Disable" or "prompt ". If you are not familiar with the related options, you can select the security level in the "reset" box, and then click "OK" to make the change take effect.

5. Cookies

I think cookies are potentially dangerous Trojans because cookies are actually an authenticated file sent from a website to a user's computer, cookies feed back the computer information to the website server, and then the server decides whether to enable the relevant permissions to the computer of the online user. However, once cookes is used by hackers, private information and data security in computers may be "stolen ". Therefore, we also need to restrict cookies. Go to Internet Options of IE, find the settings in the "privacy" tab, and set the privacy settings of cookies through a slide bar. The values are as follows: "block all cookies", "high", "medium", "medium", "low", and "accept all cookies". The default value is "medium ").

6. Information restrictions

The information on the internet is no surprise, which has prompted us to use Internet Explorer to shield some websites of grade Y that are not age-and gender-alike. I once fought through the above site and found that many of them use advanced html code and Java scripts in addition to their own spam characteristics, so that you will not be able to get rid of it once, malicious IE modification is the simplest proof. Therefore, we need to make some restrictions on IE for the sake of our next generation and for us. In the same way, go to "Internet Options", select the "content" tab, set "hierarchical Review" to enable, and then go to "", "naked", "sexual ", among the four options such as "language", you can use the mouse to slide the relevant settings based on your own and your family's situation. :) In view of the special nature of its content and the superb Comprehension Ability of readers and friends, I don't need to talk nonsense anymore.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.