Two ways to change your computer browser _windowsxp
Source: Internet
Author: User
Microsoft's Internet Explorer browser (IE) has long been the hacker's favorite target, and over the years, new security vulnerabilities have emerged, only to make hackers worse. In fact, Microsoft has recently been working on a new security vulnerability that has not yet been patched, potentially exposing users to the dangers of cyber attacks.
At the same time, the Firefox browser is popular and offers another alternative to computer users-millions of people have chosen to try so far. Although Firefox will inevitably have its own security issues to face, Firefox's preset installation environment is quite secure and does not support ActiveX control elements that often cause security problems.
So, if you've had enough of the security vulnerabilities to patch ie, how can I remove Internet Explorer? If you're using a Windows 2000 or XP operating system, here's a mixed message:
The bad news is that with the removal of IE, your windows inevitably becomes a lame operating system. But the good news is that you can turn off IE for the user and switch to another browser.
There are several simple, common ways to turn off the user's ability to browse Web pages with IE. The simplest of these is to add a fake proxy server (bogus proxy) to Internet settings in IE.
Follow these steps:
Go to IE, select Tools-Internet Options (Web option).
Press the Connections tab and click the Regional Network (LAN) setting button.
The dialog box pops up and the following box is selected in the Proxy Server project: Use the proxy server on your regional network (these settings will not apply to dial-up or VPN connections).
Enter "0.0.0.0" in the URL text field.
Enter "80" in the connecting port bar and click OK.
Note that adding a fake proxy server to your Internet settings does not affect Windows Automatic Updates (Automatic Windows Update) wiring and updates the functionality of your operating system.
You can also restrict Internet settings through Group Policy (group Policy).
Follow these steps:
On your domain controller (domains controller), right-click the organizational unit that contains the user of the domain, and then select Properties.
On the Group Policy (Group Policy) tab, click Edit.
Expand User Configuration (user Configuration) to set limits for individual users.
Expand Windows Settings (Windows Settings) and expand Internet Explorer Maintenance.
Select "Wired" (Connection) and then click Two for proxy settings (proxy settings).
Select "Open proxy Settings" (Enable proxy settings), add "0.0.0.0" to the HTTP bar, and click "OK".
Expand the Management template (Administrative Templates) and then expand the Windows Components (Windows components).
Select Internet Explorer, and then click "Turn off Change agent Settings" (Disable changing proxy settings) under two.
Select Open, and then click OK.
Please remember, "open (enabled) sets a limit, and" Disabled "prevents a restriction from being applied to a group of users (even if you open it for a wider group of users), and" configured "does not preset any restrictions.
Before you take any step, download another browser and test it in your current configuration configurations. I strongly recommend using Mozilla Firefox. After installing a new browser, answer "yes" when asked if you want it as a preset browser.
the last Exhortation
No matter how many patches Microsoft releases, as long as there are ActiveX and browser-assisted instruction objects (Browser Helper object)-a file that accompanies IE-the hacker can control your system and steal your data. Microsoft has designed IE to perform a variety of functions, rather than security. Even with antivirus software, you can't defend your network from IE intrusion.
The so-called Windows security is not to eliminate security vulnerabilities, but to see the risk management of recruitment, and give users the desired functionality. All operating systems have weaknesses, but the prevalence of usage makes Windows the preferred target for most black-hat customers.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.