Internet Explorer settings. How to set up Internet Explorer. And is it possible to do this at all .... If Internet Explorer does not open or pages do not load

The main purpose of a browser is to view Web pages. Even a small program that takes only a few tens of kilobytes can cope with this task. The first browsers were like that. However, during the fierce competition that has flared up between the leading programs Netscape Navigator and Microsoft Internet Explorer, both programs have acquired a host of additional customizable features. In particular, Internet Explorer, emerging from the fight as a winner, has become a huge software package that allows you to adjust the program to the individual requirements of the most biased user. In this article, we will look at most of the settings that are present in the sixth version of Internet Explorer. These settings allow you to change the program interface, add the necessary panels and buttons, change the display settings for the requested pages. This article discusses ways to customize various viewing modes, including how to turn off the display of graphics, change the font size, change the color and encoding of the text of the pages you are viewing. From this article, you will also learn how to set up the necessary privacy and security mode, how to operate with certificates, how to choose the size of the folder for storing temporary Internet files, determine the connection to a particular proxy server, and much more.

Toolbar customization

First of all, let's turn to the point View control menu that provides access to the most commonly used settings.

On the menu View you can add and remove panels as you wish (fig. 1).

To add or remove buttons on standard toolbars, change their size and order, run the command Toolbars à setting, as a result, a panel will appear (Fig. 2), on which you can change the icons.

On the menu View you can also customize different browser panels: Search, Favorites, etc. (Fig. 3).

Typically, Web site developers determine the size and style of the fonts on the page. However, these settings may not be optimal for you. You can set your own text display mode in the browser settings. To do this, the menu View point the mouse cursor at Font size and select the desired size (Fig. 4).

Probably, you have come across a situation where instead of the page text, the browser issues a set of unreadable character sequences. In this case, you should check if your browser has chosen the correct encoding for this page. Cyrillic (KOI8-R) and Cyrillic (Windows) encodings are often confused.

Most Web pages contain information that allows the browser to set the required language encoding.

If the Web page does not contain this information, and Internet Explorer is set to auto-select, then the encoding will be automatically selected.

In order to enable the function of automatic encoding selection, it is necessary in the menu View Internet Explorer browser (Fig. 5) check the box Autoselect.

If auto-selection failed to determine the correct language encoding, but you know which encoding is needed in a particular case, you can select it manually using the command Additionally.

General tab

and tab General(Fig. 6) you can define the so-called "Home Page", that is, the page from which you will start browsing Web resources.

Temporary Internet Files

As you know, to speed up the viewing of pages that you have already visited, they are cached on your computer's hard drive and stored in the Temporary Internet Files folder for a certain time. This storage organization speeds up the display of frequently visited Web pages, because the browser can open them from your hard drive rather than requesting a second time from the Internet.

To see what resources are available directly from your computer, open the folder Favorites, run the command File à Work Offline and pay attention to your panel Favorites. The names of sites that are not available offline will turn gray, and those whose information is cached on the hard drive will be highlighted in black (Figure 7).

Obviously, the more space you provide on your computer for cached pages, the more likely it is that newly requested information will be stored on your disk. In order to increase the Internet cache, go to the tab General to section Temporary Internet Files and select the item Parameters, as a result of which the panel of the same name will appear (Fig. 8), in which you can configure the maximum allowable size of the folder for storing temporary Internet files.

Increasing the amount of space reserved for the folder that stores temporary files can increase the chances of previously viewed Web pages being cached on your computer, but obviously this reduces the amount of free disk space.

In the next screen of the wizard (Fig. 10), you can set the mode in which the subscription will also occur to those pages that will be referenced by the base pages. And you can set the depth of links.

Next, you will be asked to choose a page synchronization method (Fig. 11). There are two options: by command "synchronize" or using a new schedule.

If you select the "new schedule" mode, the Wizard prompts you to define the synchronization frequency and specify the synchronization time (for example, every day at 23:00).

Privacy tab

Internet Explorer ensures the user's privacy and the security of their personally identifiable information.

Internet Explorer privacy features include:

  • security settings that determine how cookies are handled;
  • privacy alerts to let you know that the Web site you are opening does not match your privacy settings;
  • the ability to view the privacy policy of the P3P Web site (the user's personal data protection format is the Platform for Privacy Preferences Project, P3P.

Due to the support of RZR, servers that collect information about visitors (primarily online stores) and ignore this format may be blocked.

The category of confidential information protected by P3P includes the user's personal data: his real name, e-mail address, etc. Protected information is also information about the visited resources of the Network, registered in cookies.

To ensure compatibility with the P3P protocol, a Web resource must describe its privacy policy, that is, determine what information about users it captures, how it stores it, and what cookies s creates. This description is formalized in accordance with the P3P specification and placed in the root directory of the site. Internet Explorer reads given file and get the necessary information.

The main channels for leakage of confidential information are third sites (they are also called third-party sites), that is, sites to which the user is addressed in parallel with the site being viewed. A third-party Web site is any Web site that is not displayed in a browser window. The website you are browsing may contain content from third party websites, which in turn may use cookies.

Internet Explorer 6.0 is set by default to block cookies from third-party sites that:

  • incompatible with P3P, that is, they did not declare their privacy policy;
  • request personal information without the express consent of the user;
  • request personal information without the implicit consent of the user.

To change your privacy settings, on the Confidentiality move the slider up to increase the protection level and down to set a lower protection level (Fig. 14). Description of customizable modes is given in the table.

It should be noted that changing the privacy mode does not affect cookies already stored on the computer.

Clicking on the button Additionally on the panel (fig. 14), you will go to the panel where you can define additional privacy settings: override automatic processing of cookies and determine the mode of accepting first-party and third-party cookies (fig. 15).

Security Tab

Internet Explorer divides the Internet into zones of different levels of security, which allows you to assign the required level of protection to each Web site.

Local Intranet (Local Zone)

Typically, this zone contains all addresses that do not require a proxy server to access. The Local Intranet zone is set to medium security by default. Thus, Internet Explorer will allow cookies from Web sites in this zone to be stored on the computer and read by the Web sites on which they were created.

Internet Explorer's privacy settings allow you to set how cookies are handled on a per-website or per-website basis.

Reliable nodes

The Trusted Sites zone is set to Low by default. Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites that created them.

Restricted Nodes

This zone is set to High by default. Internet Explorer will block all cookies from Web sites in this zone.

Content tab

Access limitation

If you use a computer at home and are afraid that your children can view those pages that you would like to restrict access to, you can resort to the settings located on the tab Content on the panel Internet Options(Fig. 19).

You can restrict access to thematic groups of sites or set a hard ban on access to specific sites.

It is quite difficult to protect a child from visiting all sites of a certain subject, but if you have information about specific sites that you want to block access to, it is naturally much easier to do this. For example, in the tab Allowed nodes you can specify a list of sites prohibited from viewing (Fig. 20).

Authentication problem

Authentication is the basis of communication security. Users must be able to prove that they are exactly who they say they are, and at the same time must be sure that their correspondents, in turn, do not impersonate someone else. This is more difficult to do online than in real life, primarily because we usually cannot meet face-to-face with a partner who provides this or that network service. However, even when you see your partner, the problem of identification does not disappear - that is why there are passports, driver's licenses, etc. To authenticate partners on the Network, you must have the appropriate certificates. Before talking about the settings, let's recall the purpose of certificates.

Certificates

A certificate is a document that verifies the identity of the owner or the security of a Web site. It is a set of data that allows you to identify the correspondent. Certificates are used to protect personal identities on the Internet and to protect your computer from insecure software.

An organization with a high trust status can issue certificates that allow the public key to be associated with the identity of its owner. Such an organization is called a Certification Authority (CA), or certification authority.

Internet Explorer uses two types of certificates: personal certificates and Web site certificates.

A personal certificate is used to verify the identity of a user visiting a Web site that requires a certificate. A Web site's certificate certifies its authenticity to those clients who access it for service.

A certificate that certifies the "identity" of a Web site is needed, for example, when sending confidential information over the Internet to a Web site, or when downloading software from a Web site.

Authentication is based on public key encryption. The certificate maps an identifier to a public key. The corresponding private key is known only to the owner of the certificate, who uses it to digitally sign or decrypt data encrypted with the corresponding public key.

The digital signature specified in the certificate is the user's electronic identification that tells the recipient that this information really came from a certain correspondent and was not changed at the stage of delivery. When a user accesses a secure Web site, the latter will automatically send its certificate to the user. As a result, the user will receive a notification that the connection is secure and the data transmitted by the user will not be available to third parties (Fig. 21), and when requesting more detailed information from the IE browser, it will give explanations about the mode of visiting the secure site (Fig. 22) .

To be able to send encrypted or digitally signed messages, the user must obtain a personal certificate and configure Internet Explorer to work with it.

Web site certificate verification when downloading software

There may be several situations when it is important for you to know that the server with which you are going to exchange data belongs to exactly the company to which it considers itself. Let's take a common example - buying or downloading free software from the Internet.

When you buy boxed software from a physical (non-electronic) store, you get a sealed box of the product, so you can trace the package for damage and, in most cases, have no doubt who made the software product. Another thing is when you download a product from the network. In this case, you do not know if the supplier of this software is exactly who it claims to be, and the downloaded software does not contain viruses, is complete, reliable, etc.

This problem can be solved by introducing an authentication code (Authenticode) into the distributed product. This technology enables software developers to include information about the developer in distributed programs through the use of a digital signature. When users download software signed with an authentication code and certified by a certificate authority, they can be sure that they are receiving the software from the company that signed it and that the software has not been modified since the signing.

Such a system is the basis for protecting the rights of consumers, for example, in case of viruses in the code. Based on code authentication, users can safely receive signed ActiveX controls, signed Java applets, and other applications.

Software developers are also interested in authenticating a product distributed over the Web, as this makes it more difficult for their software to be counterfeited.

Any company that wants to distribute software or content over the Internet needs such a system.

Client Microsoft programs, such as Internet Explorer, Exchange, Outlook, Outlook Express, come with security systems that already include a system for authenticating program code downloaded over the Web. This is necessary primarily because the above systems are designed for replenishment from the Web. According to the component model, elements such as ActiveX or Java applets can be downloaded to your computer when you browse a Web site. When a user accesses a Web page that needs to play an animation or sound, code is often downloaded to the client machine to implement the desired function. In this case, the user runs the risk of downloading a virus or other unsafe code. In order to protect the user, there is a system of signed applications.

If a user of the above client applications encounters an unsigned component, the following will happen:

  • if the application's security system is set to "High security" mode, the client application will refuse to download the code;
  • if the application's security system is set to the "Medium security" mode, the client application will issue a warning (Fig. 23);
  • if, on the contrary, the user encounters a signed applet, the client program will issue a different message (Fig. 24).

Having received confirmation of the authenticity of the downloaded software, the user understands that, firstly, the software that he is going to download really belongs to the publisher, and secondly, he knows that authentication is provided by such and such a center, and represents where to get additional information in order authentication. In this session, users can trust the further download procedure. Users can also choose to "Always trust downloads from this publisher" to speed up the verification process in the future.

Users can always get additional information about the certificate (Fig. 25).

Installing Publisher Certificates

Certificate issuers create special, so-called root, certificates for themselves, confirming the authenticity of their private keys. Each specific type of certificate has its own root certificate: one for e-mail certificates, another for full personal certificates, and a third for servers. Usually browsers are released with a set of such certificates.

If, while browsing the Internet, you encounter a server with a certificate issued by an unknown issuer, you will be prompted to accept that certificate and, if it contains a root certificate from the same issuer, you will be offered the option to install that certificate and assign actions to servers with certificates issued by this publisher.

The use of digital certificates can ensure the security of your transactions on the Internet, as it allows you to associate the identity of the certificate holder with a pair of keys (public and private).

Obtaining a personal certificate

So far, we have talked about the need for servers to prove their authenticity. However, in some cases, servers require confirmation of the identity of the client. Therefore, now we will talk about personal certificates. There are several categories of reliability of certificates issued by independent certificate authorities.

Personal certificates are used to verify the user's identity as required by some sites that provide a particular service. Certificates are issued by the same certificate issuers, i.e. a third party trusted by both the user and the service operator.

To obtain a certificate, you must register with the certificate issuer of your choice.

Usually, in order to obtain a certificate, you need to provide the issuer of certificates by mail, and sometimes personally, certain documents, and then pay for the certificate.

The procedure for obtaining a certificate is as follows: you access the certificate issuer's Web server, fill in the data required to obtain a specific certificate, and select the length of the private key (preferably at least 1024 bits). Before submitting the form, your browser will generate a public (public) and private (private) key pair and store them in a password-protected database. The private key is known only to you - it should not be known to anyone else, including the certification authority. Instead, the public key is sent along with the other data entered to the certification authority to be included in the certificate. It is impossible to determine its pair - the private key - from the public key.

After the certificate is issued, the certification authority will usually send you a certificate or provide a URL where you can download it from. After downloading the certificate from the certificate issuer, the browser automatically starts the installation procedure.

Installing and removing certificates

Internet Explorer has a certificate manager - Internet Explorer Certificate Manager (Fig. 26).

It allows you to install and remove client certificates and certificates of certification authorities, or, as they are also called, CA (from the English Center Authority). Many CAs already have root certificates preinstalled in Internet Explorer. You can choose any of these preinstalled certificates for code authentication, document time stamping, secure mail, and more. To install or remove certificates, go to the tab Content. Select an item Certificates, and then the corresponding tab. The following tabs are available: Personal, Other Users, Intermediate CAs, Trusted Root CAs, etc.

Category certificates Personal have corresponding private keys. Information signed with personal certificates is identified by the user's private key. By default, Internet Explorer places all certificates that identify a user (using a private key) in the category Personal.

In the tab Trusted Root Certification Authorities usually, root certificates are already pre-installed, which you can view and get all the information about them: by whom they were issued, their validity period, etc. (Fig. 27).

By clicking on one of the certificates, you can get additional information about it, including the composition and certification path (Fig. 28).

Setting up a proxy server in Internet Explorer

As you know, modern browsers, such as Internet Explorer and Netscape Navigator, have internal cache settings that allow you to determine the amount of disk space on your machine that will be used to cache documents you have already viewed. The browser periodically updates the documents in the cache to keep them fresh. However, the amount of cache on a PC is usually small, because PC users rarely allocate more than a gigabyte of disk space for caching, so the amount of stored documents is small. It is difficult to allocate a large amount of memory on a local computer, but this can be done on the provider's proxy server - a computer running a special program that caches data requested by all clients of this provider. Large providers can allocate tens and even hundreds of gigabytes to their customers. Some users are concerned, however, that they will get out-of-date documents by using cached documents from a proxy server, but there is technology to avoid this.

There are a number of criteria by which a decision is made about caching on a proxy server. For example, if an object is marked as confidential, then it will not be cached. Similarly, there are criteria by which a decision is made on the possibility of sending a cached document to a client request. For example, if a document has expired, the server will not send it to the client, but will request a fresh document. This way, fresh documents (with not expired expiration dates) are provided immediately, and if the proxy server has doubts that the document is fresh, it can ask the Web server if the document has changed. It is possible that the expired document is not really out of date because it has not been updated, in which case the Web server will respond to the proxy server that the document is not "corrupted" yet and can be served upon client request. In other words, there is every reason to use a proxy server.

To configure connection through a proxy server, go to the tab Connections on the panel Internet Options(Fig. 32) and instead of paragraph Never use(which you probably had configured if you did not work through a proxy server) select the item Always use the default connection.

Then refer to paragraph Setting, which will lead to the appearance of the panel shown in Fig. 32 .

Check the box Use a proxy server for this connection and enter the proxy server address and port - these addresses should be obtained from your ISP. I use the services of Zenon and in my case it is proxy.aha.ru. Next, go to Additionally(Fig. 33) and indicate One proxy server for all protocols.

It should be noted that work through a proxy server is not always optimal. The most obvious example is if you have faster access to a certain Web server than to a proxy server, then there is no point in accessing through a proxy server. Or, for example, if you are debugging Java applets on some server and you need to constantly check how well your software, then, of course, you will not be satisfied with downloading a previous version of the applet. On the panel shown in Fig. 33 Additionally, play video, as a result, pages will load faster.

After you have removed the display of images and loaded the page, it will be displayed in a "truncated" form, as shown in Fig. 37 . Icons will replace pictures. By right-clicking on such an icon, you can call up the context menu and view the required image.

ComputerPress 11 "2002

Setting up the Internet Explorer browser. Today we will talk about the web browser, namely the veteran Internet voyage to the well-known Internet Explorer.
And so Microsoft developed Internet Explorer and built it into operating system Windows by default. That is, it is installed along with the installation of Windows itself and is updated automatically if you do not change the settings.

Now a little about him. Like any browser, Internet Explorer has an address bar that can be used not only to access pages, but also as a field for entering search queries. By the way, the default search engine for the address bar can be configured at the request of the user.

Supports Internet Explorer to work with a large number of tabs at the same time, has the ability to create bookmarks and has a lot of additional settings and features that are often not expected from it as the default browser (browser included).

Let's take a look at some simple settings.
Address bar - used directly for entering site addresses, and for entering search queries. If everything is clear with addresses, then with search queries it is a little more complicated. There are many search engines (Google, Bink, Yandex, etc.), to set the default search engine to the one you use, you need to go to the settings (click on the gear in the mountain on the right), then select "configure add-ons". In the window that opens, select "search services", select the one you need and click on the "Set as default" button,


if your search engine is not in the list, follow the link at the bottom of the "Find other search services" window and find the one you need in the list and add it.


When starting the browser, at startup, each user wants to see his or his pages, which he regularly views, and not offered by default. It is very simple to do this, again we go to the settings, select "Internet Options" in the window that opens, the "General" tab, then in the "Home Page" field we prescribe your site or sites via Enter, click apply and ok.


An ordinary user looks through a lot of sites when searching for information, so it often becomes necessary to save a link to a site in order to return later. To do this, the site can be added to favorites; it is very simple to do this, when viewing the site, click on the browser settings and select "add site to the list of applications." Now, if you need to quickly go to this site, just click on the star icon next to the settings icon and you will see a list of saved sites.


If we talk about the icons in the mountain on the right (gear-settings, asterisk-selected sites, house-view). Then by clicking on the house we will get to the start page or a group of pages that opens in us when the browser starts. This is convenient when you work a lot with one site, in a split second (in one click) you immediately get to it.


In general, we introduced you to the main functions of the Internet Explorer browser, which should be configured for convenient work in it.

Let's take a look at the IE menu - Tools>Internet Options. The Internet Options window contains seven tabs. The most interesting for us are the General and Connection tabs (Fig. 11.5). The main settings are collected on the Connections tab (Fig. 11.5, on the right). The Install button launches the New Connection Wizard. There are three selectors in the Remote Access Settings area: Never use, Use when not connected to the network, Always use the default connection. The first selector - Never use - is included when connecting only by local network.

If you are connecting exclusively by modem (and not able to connect to the Internet via LAN), select Use when not connected to the network. This selector is also selected for modem connection if LAN connection fails. The last selector Always use default connection is selected to connect the default modem connection.

Access to the Internet can be optimized using a proxy server. Its use is not always required, but it is recommended. When using a proxy server, the Use proxy server option must be checked. Disabling this option allows you to establish a connection "directly", for example, if the proxy server fails.

The General tab of the Internet Options window is shown in fig. 11.5 (left). To reduce browser loading time, we recommend that you click the From empty button in the Home page area. If there is not enough space on the disk, on the same tab you can use the Delete files button in the Temporary Internet files area or configure the storage settings using the Settings button. The purpose of the standard buttons (Colors, Fonts, Apply or OK) should be clear to you, so we won't dwell on them.

The options on the Programs tab of the Internet Options dialog box should also be easy. By default, it has the standard Windows applications, used for the HTML editor, Email, newsgroups, and calls over the Internet. If you want IE to be the default browser, check the Check if IE is the default browser option.

Fine-tuning IE is done on the Advanced tab. Check the required options in the Settings list. The list is quite extensive - having studied it, you will configure the browser with maximum (just for you) convenience. There is no risk here, because the Restore Defaults button will always allow you to return to the original values.

To switch to the Internet Explorer settings mode in the Control Panel, select the Network and Internet Connections category, and then the Internet Options icon. As a result, the Internet Properties window will appear on the screen. This window contains the following tabs: General, Security, Privacy, Content, Connections, Programs and Advanced.

Let's look at how to work with each of them.

On the General tab, configure general settings.

In the Address field, specify the address of the web page that the user has chosen as their home page. A web home page is a page on the Internet that opens by default every time you start your browser. You can return to this page at any time while browsing the Internet by clicking the Home button on the toolbar or by executing the View Go Home page command from the main menu of the Internet Explorer window.

Pressing the From current button allows you to select the page that is currently open as the home page. The From Home button restores the page that was set when the browser was installed as the home page. If the home page is not needed, then click the C empty button. In this case, when you start the Internet browser, a blank page will open, and the Address field will take on the value about:blank. To delete temporary Internet files, the Delete Cookies and Delete Files buttons are used. Using the Options button, you can switch to the mode of setting and editing the settings for the folder of temporary Internet files.

The Options window will appear on the screen. Use the Check for updated saved pages switch to set the required mode for checking for updated saved pages. The Temporary Internet Files Folder area displays the location of the folder that contains the temporary Internet files. In the Take up on disk no more field, specify the maximum amount of hard disk space allocated for this folder.

You can use the Move button to move the Temporary Internet Files folder to a specified location; this will open the Browse Folder window, in which, according to the usual Windows rules, you must specify the required path. To open a folder with temporary Internet files, use the Browse files button. In the field How many days to keep links on the General tab, specify the number of days during which the browser should store links to recently visited pages. Using the Colors button, you can switch to the color selection mode for displaying web pages. Clicking this button will open a window.

Security Options
On the Security tab of the Properties: Internet window, configure the Internet security settings. The upper part of this tab lists the Internet zones accessible from this local computer. The Security level for this zone area displays the security level settings for the zone highlighted at the top of the tab. To change these settings, click the Custom button. If necessary, you can restore the default security settings for each zone. To do this, click the Default button (you must first select the icon of the required Internet zone).

Confidentiality
The Privacy tab contains options that allow you to set the level of privacy you use while browsing the Internet. The required privacy level is set using the corresponding slider. In this case, a brief description of the selected privacy level is displayed to the right of the slider. By clicking the Advanced button, you can switch to the mode for setting additional privacy settings (in particular, in this mode, you can configure the processing of cookies by the browser). Optionally, you can set privacy for individual Web sites.

To do this, use the Change button. Clicking it opens the Privacy for individual Web sites window, in which you perform the necessary actions. The Contents tab contains options for accessing information received from the Internet, options for the auto-complete mode, and some of the user's personal data. Using the Settings button, you can switch to the settings mode for restricting information received from the Internet. This feature is especially useful for monitoring children's visits to certain websites and their exposure to certain materials. Clicking this button opens the Access Restriction window.

When you first open this window, the system will prompt you to enter an access password, which should be remembered, since the system will request this password on subsequent attempts to enter this mode. Use the Enable (Disable) button to enable/disable established restrictions; it also requires you to enter a passcode. By clicking the Autofill button on the Contents tab, you can enter the autofill settings mode. This will open the corresponding window. In this window, you define the objects for which you want to use auto-fill (possible options are for web addresses, forms, usernames and passwords in forms), and also clear the auto-fill log (using the Clear Forms and Clear Passwords buttons).

If the Prompt to save password check box is selected, the system will ask whether to save the new password after entering it in the field of the web page. If the answer is yes, the password will be saved, and in the future, when entering a username in the field of the web page, the system will automatically display the password corresponding to this name. To enter some personal information about the user provided by certain Web sites, on the Contents tab, click the Profile button.

Connections
The Connections tab contains information about previously configured Internet connections. To create a new computer connection to the Internet, you must click Install. As a result, the New Connection Wizard window will appear on the screen (the procedure for creating a new connection is described in the section).
To create a new network connection you should use the Add button, to delete an existing one - the Delete button (you must first place the cursor on the object to be deleted). Using the Settings button, you can switch to the mode of viewing and editing the parameters of a network connection selected in the list of connections. To switch to the local network settings mode, click the LAN settings button.

Programs
The Programs tab defines the programs that will be used automatically when working with the Internet. In the HTML Editor field, from the drop-down list, select the program that the browser will use to edit HTML files: Microsoft Word, Microsoft Excel or Notepad. Depending on the value given field the corresponding command will be displayed in the File submenu of the main menu of the Internet Explorer window. If the HTML Editor field is set to Microsoft Word, the File menu will display the Edit in Microsoft Word command. Office Word, if Microsoft Excel is selected - the command will be called Edit in Microsoft office

Excel, if Notepad - Edit to Notepad is selected.
- In the E-mail field, from the drop-down list, select the e-mail program (for example, Outlook Express or The Bat!), which will be used by Internet Explorer.
- In the Newsgroups field, specify the program for reading Internet newsgroups that Internet Explorer will use.

In the Internet Connection field, specify the dialer that Internet Explorer will use.
- In the Calendar field, specify the Internet calendar program that Internet Explorer will use.
In the Address Book field, select the address book program that Internet Explorer will use. If you check the box
Check if Internet Explorer is the default browser, then each time you start Internet Explorer, the system will check if this browser is the default browser. If another Internet browser is used as the default, the system will offer to restore the use of Internet Explorer as such. Checking this box makes sense if there is another browser installed on the computer besides Internet Explorer.

Additionally

On the Advanced tab, you can configure additional options for some browser modes. In particular, using the appropriate checkboxes, you can turn on / off the display of pictures and their frames, playback of animations, sounds and videos on web pages, automatic check for Internet Explorer updates, etc. Security settings are placed in a separate section. If necessary, you can restore the default settings offered by the system by clicking the Restore Defaults button.

All parameters of this tab, depending on the functionality, are divided into groups: Microsoft VM, Security, Multimedia, HTTP 1.1 settings, Browse, Print, Search from the address bar and Accessibility. Let's dwell on each of them. Microsoft VM In the Microsoft VM group, make the following settings.

If the Log Java Language check box is selected, the browser will log all active Java programs.
- If the Use Java Jit Compiler check box is checked, then when you visit a website that uses Java programs, the browser will automatically generate and run those programs. In other words, this flag enables Internet Explorer to use the built-in Java compiler.

It is recommended to set the checkbox Java language scoreboard is enabled if you plan to test Java programs. Settings made using the Use Java Jit Compiler and Java Language Display Enabled checkboxes do not take effect until the computer is restarted.

Security
- In this group, configure additional security settings.
- By checking the SSL 2.0, SSL 3.0, and TLS 1.0 checkboxes, the browser will send and receive confidential information using the SSL 2.0, SSL 3.0, and TLS 1.0 protocols, respectively. In doing so, the following must be taken into account:
- SSL 2.0 protocol is supported by all secure websites;

SSL 3.0 is more secure than SSL 2.0, but some websites do not support it;
- the TLS 1.0 protocol has a degree of protection comparable to that of the protocol
- SSL 3.0; some websites do not support this protocol.
- By checking the Enable Integrated Windows Authentication checkbox, Integrated Windows Authentication is enabled. This setting does not take effect until the computer is restarted.

If you select the Enable profile check box, the browser will display requests from websites to provide them with data from the user's profile. If you uncheck this box, then the browser will not transmit information about the user and, accordingly, display web site requests.
- By checking the box Do not save encrypted pages to disk, the saving of secret information in the folder with temporary Internet files is prohibited. This mode is recommended to be set if several users have access to the computer.
- If you select the Warn about switching security mode check box, the browser will inform you when switching between safe and insecure Internet sites.

By checking the Signature verification for downloaded programs checkbox, the downloaded programs authentication mode is enabled. - If you select the Check for revocation of server certificates check box, Internet
- Explorer will check the validity of node certificates on the Internet. - This setting takes effect only after restarting the computer.
- If you select the Delete all files from the Temporary Internet Files folder when the browser is closed check box, the Temporary Internet Files folder will be automatically cleared when you close the Internet Explorer window.

Multimedia
In this group, configure the following parameters.
If you select the Enable automatic image resizing check box, the browser will reduce the size of oversized images on web pages. The Play animation on web pages checkbox enables/disables the animation playback mode on web pages. Some web pages that contain animation load very slowly, and to speed up their loading, it is advisable to check this box.

The Play videos on web pages and Play sounds on web pages checkboxes enable/disable playback modes of video and sounds on web pages, respectively. By deselecting the Show Pictures check box, you can disable the display of graphics to speed up the loading of web pages. If you select the Show picture frames check box, then picture frames will be displayed while loading pictures. This will allow you to get an idea of ​​the location of the elements of the web page before it is fully loaded. Enabling this mode makes sense only when the Show pictures checkbox is checked.

Checking the box Enhanced rendering of color shades turns on the mode
image smoothing. HTTP 1.1 configuration There are two parameters to configure in this group. Selecting the Use HTTP 1.1 checkbox enables the mode of using the HTTP 1.1 protocol when connecting to web sites.
If you select the Use HTTP 1.1 through proxy connections check box, the browser will use the HTTP 1.1 protocol when connecting to Web sites through a proxy server.

Overview
In this group, configure the following parameters. If you select the Automatically check for Internet Explorer updates check box, the browser will periodically check for updates on the Internet new version programs. When a new version is found, a corresponding message will appear and the browser will ask you to confirm its download. If you select the Enable display styles for buttons and other controls on web pages check box, the browser will apply the Windows display settings to design web pages (see Section 3.1).

If you select the Enable personal Favorites menu check box, the Favorites submenu of the main menu of the Internet Explorer window will not display links that have not been used for a long time. To access them, click on the arrow at the bottom of the menu. If you clear the Enable third-party browser extensions check box, the browser will not be able to use tools designed for Internet Explorer that are not developed by Microsoft. This setting takes effect only after restarting the computer. If you select the Enable Install On Demand (Internet Explorer) check box, Internet Explorer will automatically download and install the necessary components to complete a task.

If you select the Show detailed http error messages check box, then if an error occurs while connecting to a server, the browser will display detailed information about the error and advice on how to resolve it. If this checkbox is unchecked, the browser will only display the error code and name.

By checking the box

Use built-in auto-complete enables the mode to auto-complete web addresses in the address bar as you type them. In this case, the browser uses the previously entered addresses that partially or completely match the desired one. If you clear the Use the same window to load shortcuts check box, then web pages opened using links from any document or program other than Internet Explorer will be displayed in a new browser window.

If you select the Use passive FTP protocol (for compatibility with firewalls and DSL modems) check box, the browser will use the passive FTP protocol, which does not require determining the computer's IP address. This mode is considered more secure.
Use the Underline links switcher to select the required link underlining mode:
Always - links are underlined all the time (this mode is set by default); Never - links are not underlined; On hover - links are underlined only when hovering over them with the mouse pointer. If you select the Show button "Go to address bar" checkbox, then the address bar of the browser window will have a Go button.

By setting the Show short links checkbox, the mode of briefly displaying the address of an object (link, picture, etc.) is switched on in the status bar. If this checkbox is cleared, then the address of the object is displayed in the status bar in full format. If you select the Allow folder views for FTP sites check box, the FTP sites will be displayed as a folder (as in Explorer). If this check box is cleared, FTP sites are displayed in HTML format (this is the default setting). If you select the Notify me when download is complete checkbox, a corresponding message will appear on the screen after the download is complete.

Only one setting can be configured in the Print area. If you select the Print Background Colors and Patterns check box, the background image will also be printed when you print the web page. Please note that depending on the printer you are using, print speed and quality may be affected. Search from the address bar. This area contains a checkbox When searching, which can take the following values. Do not search from the address bar - when this value is selected, search from the address bar is disabled.

To search, you will need to use the Search button located in the toolbar of the browser window.
Show results and go to the most similar site - in this case, the search bar will display links to web pages with addresses similar to the desired one. In this case, the browser will open the web page closest to the address to the desired web page. Only go to the most similar site - when you select this option, the search results will open the web page whose address is closest to the one you are looking for.

Only show results in the main window - in this case, the results of searches made using the address bar will be displayed in the main window. Accessibility options in this group configure the following settings. If you select the Always expand text for images check box, then when the Show pictures check box is cleared in the Media group, the space allocated for the picture will increase in size to display all the text associated with it. If you select the Move system caret after focus and selection check box, the system caret will move depending on the change in focus or selection. This setting is important when working with programs that use the system caret to determine the desired area of ​​the screen.

According to statistics, internet explorer is one of the most popular browsers. The popularity of the Internet browser is due to the fact that it is installed by default in Windows, and the user does not need to download the program additionally. Despite the fact that some webmasters sometimes complain about this application, it still continues to occupy a leading position. To date, the latest version is shipped on devices with Windows 8, although it is also available for other operating systems from Microsoft. Actually, let's talk in more detail about what the Internet explorer browser setting should be.

First launch of internet explorer

For the first time when you start the browser, a welcome window will open. If we are talking about how to set up internet explorer 8, then there will be a proposal to speed up the program using add-ons. After you click Next, a window will appear in front of you in which you can set the settings for the recommended websites. When you activate the Recommended sites feature, the browser will offer you a list of resources, depending on which pages you visited most often.

The next window that will open is the selection of options. You can leave them as default or change any settings to your liking. If you select special options, the user gets the opportunity to customize the browser as it suits him.

Next, a window will open in the Internet browser in which you can select a search provider. In other words, these are search engines that can be accessed in the program itself. Once the provider is installed, you will not need to go directly to the website in order to use its services. Its symbol will appear on the browser toolbar. In order to select a resource, put a checkmark next to the inscription, which means that after installation, show the page for selecting a search provider. If you leave this setting as default, you will still be accessing search engines which takes time. Therefore, I advise you to still mark here google, yandex or another resource. How to make Yandex the start page you will learn in more detail.

If we talk about whether it is necessary to search for updates for search services, then it should still be noted that the browser searches for them automatically. The Internet browser is equipped with various additional tools. So, you can note accelerators that will help you get instant access to the most frequently visited pages. The browser setup wizard will prompt you to enable or disable this feature. Some users note that it can slow down the Internet browser, so they prefer to deactivate it. Actually, you can always change the settings, but for starters, I advise you to study the accelerators, perhaps you will like them.

SmartScreen filters provide protection against malware and phishing programs. Turning them on or off is everyone's business. However, given the fact that computer infections have become more frequent recently, increasing the security when connecting to the Internet will not hurt. In versions 8 and above, there is such an option as browsing in safe mode, and you can’t forget about it when you talk about how to configure the internet explorer browser. It is required when visiting web resources that are optimized for earlier versions of the browser. About how convenient and useful this mode is, everyone can evaluate on their own by turning on the function. Do not forget that it can always be disabled in the browser settings.

Completing the initial setup

After the internet explorer customizer completes its work, if you have done everything as indicated above, three windows will appear in front of the user. First, this is the home page of the browser. In addition, windows with a list of accelerators and search engines will open. The latter can be initially bookmarked, as they may be useful in the future, for example, to change these settings and install updates.

You can select multiple search engines and then click the Finish button. You can find them in the upper right part of the browser. We do the same with accelerators, mark those that you need, and confirm our actions. When might boosters be needed? For example, if you have chosen a translator as an add-on, then opening any page in the browser, you will need to select the text of interest. Next to it you will see a blue arrow, after clicking on which a list of accelerators will appear in front of you. Choose a translator and get a ready-made translation of the text almost instantly.

Now let's look directly at the browser interface. At the top of the screen you will see several panels, they contain a wide variety of tools that help the user in how to configure internet explorer 10 or another version of the browser. Command line contains the same buttons as in the browser menu, however, it is intended for quick access to them. Usually, each button has its name written on it, which can be changed by going to Settings and choosing to display as icons.

Browser settings are located in the item Tools - Internet Options. Before setting up internet explorer 11 or earlier, you should carefully study what is offered by the developers. So, here you can change the home page. To do this, you need to go to the General tab. If you want a blank page to load, click on the button of the same name. In the address field, you can enter the address of the tab from which you want to load.

The listed settings are far from all that are offered in internet explorer. BUT latest versions Developers have endowed the browser with additional features that make working with the Internet browser more comfortable. You should not be afraid to experiment and change the parameters, because you can, if you wish, whenever you want, you can always if something does not suit you.

After installing the Internet Explorer browser, it is necessary to carry out its initial configuration. Thanks to it, you can increase the performance of the program and make it as user-friendly as possible.

General properties

The initial configuration of the Internet Explorer browser is carried out in the section "Tools - Browser Options".

In the first tab "General" you can customize the bookmarks bar, set which page will be the start page. Various information, such as cookies, is also deleted here. According to user preference, can be customized appearance using colors, fonts and design.

Security

The name of this tab speaks for itself. The security level of the Internet connection is set here. Moreover, you can distinguish between this level of dangerous and safe sites. The higher the security level, the more advanced features can be disabled.

Confidentiality

Access is configured here in accordance with the privacy policy. If sites do not meet these requirements, you can prevent them from sending cookies. It also sets a ban on determining the location and blocking pop-up windows.

Additionally

This tab is responsible for configuring advanced security settings or resetting all settings. There is no need to change anything in this section, the program automatically sets the necessary values. In case of various errors in the browser, its settings are reset to the original ones.

Programs

Here we can assign Internet Explorer browser default and manage add-ons, i.e. additional applications. From the new window, they can be disabled and enabled. Removes add-ons from the standard wizard.

Connections

Here you can connect and configure virtual private networks.

A very handy feature of this section is family safety. Here we can adjust the work on the Internet for a certain account. For example, deny access to certain sites, or vice versa, enter a list of allowed ones.

The list of certificates and publishers is immediately corrected.

If you enable the autocomplete function, the browser will remember the entered lines and fill them in when the initial characters match.

In principle, the settings of the Internet Explorer browser are quite flexible, but if you wish, you can download additional programs that will expand the standard functions. For example Google Toollbar (to search through Google) and Addblock (to block ads).

Share with friends or save for yourself:

Loading...