DESKTOP

Windows 7 : Protecting Your Computer While Browsing (part 3)

1/31/2011 5:05:56 PM

4. Blocking Pop-Ups

Some web pages contain pop-ups. A pop-up is a subwindow that is displayed when you access a web page. Sometimes pop-ups appear on top of the browser window; other times they appear under the browser window. Because most pop-ups contain ads or are otherwise unwanted content, Internet Explorer blocks most types of pop-ups it recognizes by default in all security zones, except the Local Intranet zone. This means Internet Explorer uses the Pop-up Blocker when you are browsing sites on the public Internet, trusted sites, and restricted sites, but does not use the Pop-up Blocker when you access sites on your local network.

By default, when a pop-up is blocked, Internet Explorer displays a message on the Information bar stating this. If you click the Information bar and select Temporarily Allow Pop-ups, Internet Explorer will allow pop-ups from the site until you navigate away from the page. Alternatively, if you click the Information bar and select Always Allow Pop-ups from This Site, Internet Explorer will configure the site as an Allowed Site, and all pop-ups for the site will then be displayed.

You can enable or disable pop-up blocking by completing the following steps:

  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Privacy tab, select the Turn on Pop-up Blocker checkbox to enable the Pop-up Blocker, or clear the Turn on Pop-up Blocker checkbox to disable the Pop-up Blocker.

With pop-up blocking enabled, you can configure the way the Pop-up Blocker works by completing the following steps:

Figure 7. Configuring Pop-up Blocker settings


  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Privacy tab, select Settings under Pop-up Blocker. This displays the Pop-up Blocker Settings dialog box shown in Figure 7-20.

  3. You can use these options to add or remove allowed sites:

    Add

    To allow a site’s pop-ups to be displayed, type the address of the site in the field provided, such as www.msn.com, and then click Add. This site is then permitted to use pop-ups regardless of Internet Explorer settings.

    Remove

    To remove a site that is currently allowed to display pop-ups, click the site address and then click Remove.

    Remove All

    To remove all sites that are currently allowed to display pop-ups, click Remove All. When prompted to confirm the action, click Yes.

  4. To stop playing a sound when a pop-up is blocked, clear “Play a sound when a pop-up is blocked.”

  5. To stop displaying an information message in the browser when a pop-up is blocked, clear “Show Information Bar when a pop-up is blocked.”

  6. By default, most types of automatic pop-ups are blocked when the Pop-up Blocker is enabled. You can use the following options of the Blocking Level list to control the types of pop-ups that are blocked:

    High: Block all pop-ups (Ctrl-Alt to override)

    With this setting, Internet Explorer tries to block all pop-ups. To temporarily override this setting, press Ctrl-Alt while clicking a link to open a page and its related pop-up.

    Medium: Block most automatic pop-ups

    With this setting, Internet Explorer tries to block pop-ups most commonly used to display ads or other unwanted content. Some types of pop-ups are allowed. To override this setting temporarily, press Ctrl-Alt while clicking a link to open a page and its related pop-up.

    Low: Allow pop-ups from secure sites

    With standard (HTTP) connections, Internet Explorer attempts to block pop-ups most commonly used to display ads or other unwanted content. With secure (HTTPS) connections, Internet Explorer allows pop-ups.

  7. Click Close and then click OK to save your settings.

5. Protecting Your Computer from Phishing

Phishing is a technique whereby a site attempts to trick you into giving them personal information by impersonating your bank or other trusted establishment that you have a relationship with. Internet Explorer 8 includes SmartScreen filter, which is a phishing filter that is designed to warn you about potential phishing sites and known phishing sites. The warning is displayed on the Status bar as discussed previously.

SmartScreen filter is active by default for all security zones, except the Local Intranet zone. This means Internet Explorer uses the phishing filter when you are browsing sites on the public Internet, trusted sites, and restricted sites, but does not use the phishing filter when you access sites on your local network.

The phishing filter is always on by default. In Internet Explorer, you can turn off this feature by clicking Safety→SmartScreen Filter→Turn Off SmartScreen Filter. You can then manually check sites if desired by using the Check This Website option. If you suspect a site is collecting personal information without your knowledge or consent, you can report the site by using the Report Unsafe Website option. Keep in mind that you may have granted implied consent to a site when you signed up to use a site, or when you downloaded and installed a particular browser add-on or related Internet software.

Other  
  •  Windows Server 2008 : Understanding Active Directory Sites (part 2)
  •  Windows Server 2008 : Understanding Active Directory Sites (part 1)
  •  Windows Server 2008 : Understanding AD DS Replication in Depth
  •  Programming Excel with VBA and .NET : Knowing the Basics - Classes and Modules
  •  Windows 7 : Indexing Your Computer for Faster Searches (part 3) - Optimizing File Properties for Indexing
  •  Windows 7 : Indexing Your Computer for Faster Searches (part 2) - Specifying Files Types to Include or Exclude
  •  Windows 7 : Indexing Your Computer for Faster Searches (part 1) - Adding or Removing Indexed Locations
  •  Windows Server 2008 : Designing Organizational Unit and Group Structure - Exploring Sample Design Models
  •  Windows Server 2008 : Designing Organizational Unit and Group Structure - Understanding Group Design
  •  Windows Server 2008 : Designing Organizational Unit and Group Structure - Group Policies and OU Design
  •  Windows 7 : Searching Your Computer (part 2) - Search Filters
  •  Windows 7 : Searching Your Computer (part 1)
  •  Windows 7 : Putting Windows Explorer to Work for You
  •  Windows Server 2008: Using OUs to Delegate Administration
  •  Windows Server 2008: Defining AD Groups
  •  Windows Server 2008: Defining Organizational Units in AD DS
  •  Windows 7 :Navigating Your Computer with the Address Bar (part 2) - Using Selected Paths to Quickly Navigate Your Computer
  •  Windows 7 :Navigating Your Computer with the Address Bar (part 1) - Accessing Locations on Your Computer
  •  Windows 7 : Exploring and Searching Your Computer - Exploring Your Documents
  •  Designing a Windows Server 2008 R2 Active Directory : Renaming an AD DS Domain
  •  
    Most View
    Developing BlackBerry Tablet Applications : OS Interactions - Splash Screen
    Running a SharePoint Site on Windows Home Server : Working with Site Settings (part 1) - Customizing a Site
    Adobe Fireworks CS5 : Selecting with the lasso tools
    Mac Mini (Late 2012) - Quad-Core Computing In A Tiny Box
    Top Tablet Apps – November 2012 (Part 2)
    Edimax IC-7110W - Strong IP Camera
    Audio Research REF-10 Preamp (Part 1)
    Handwriting Input And Recognition (Part 2)
    Asus P8H77-MSI - A Micro-ATX Motherboard
    ECS Z77H2-A2X v1.0 - Golden LGA 1155 Mainboard From The Black Series (Part 6)
    Top 10
    Gigabyte P35K - The 15.6”GIGABYTE Gaming Laptop
    Microsoft Surface Pro 2 and Surface 2
    Venom BlackBook 17 - A Powerhouse Notebook Computer
    7 Tips For Using iOS 7
    Top 7 Apps for Your First iPad
    The Best Mobile Apps (Part 3) - Switchr, QuizUp, Hudway Augmented Reality
    The Best Mobile Apps (Part 2) - Pages
    The Best Mobile Apps (Part 1) - BBM
    Apple MacBook Pro With Retina Display 13in (Late-2013)
    Asus MB168B+ - Portable Monitor