How to customize Internet Explorer. And can this be done at all ...

The main purpose of the browser is to view Web pages. Even a small program that takes only a few tens of kilobytes can cope with this task. The first browsers were like that. However, during the fierce competition that erupted between the leading programs Netscape Navigator and Microsoft Internet Explorer, both programs have acquired a lot of additional customizable features. In particular, Internet Explorer, emerging from the battle as a winner, has turned into a huge software package that allows you to customize the program to the individual requirements of the most biased user. In this article, we will cover most of the settings that are present in the sixth version of Internet Explorer. These settings allow you to change the program interface, add the necessary panels and buttons, change the display parameters of the requested pages. This article discusses how to customize various viewing modes, including disabling graphics, changing the font size, changing the color and encoding of the text of the pages being viewed. From this article, you will also learn how to configure the required privacy and security mode, how to operate with certificates, how to select the size of the folder for storing temporary Internet files, determine the connection to a particular proxy server, and much more.

Toolbar customization

First of all, let's turn to the point View the control menu, which provides access to the most frequently used settings.

On the menu View you can add and remove panels as you wish (fig. 1).

To add or remove buttons on standard toolbars, change their size and order, run the command Toolbars à Setting, as a result, a panel will appear (Fig. 2) where you can change the icons.

On the menu View you can also customize the various browser panes: Search, Favorites, etc. (fig. 3).

Typically, the developers of a Web site determine the size and style of the fonts on the page. However, these parameters may not be optimal for you. You can set your own text display mode in the browser settings. To do this, in the menu View point the mouse cursor to Font size and select the required size (fig. 4).

You've probably come across a situation where, instead of the text of the page, the browser displays a set of unreadable sequence of characters. In this case, you should check if your browser has selected the correct encoding for this page. Cyrillic (KOI8-R) and Cyrillic (Windows) encodings are often confused.

Most Web pages contain information from which the browser can set the required language encoding.

If there is no such information on the web page, and Internet Explorer is configured with the automatic selection function, then the encoding will be selected automatically.

In order to enable the function of automatic selection of encoding, it is necessary in the menu View Internet Explorer (Fig. 5), check the box in paragraph Auto select.

If using autoselection it was not possible to determine the correct language encoding, but you know which encoding is needed in a particular case, you can select it manually using the command Additionally.

General Tab

in the tab General(Figure 6) you can define the so-called "Home page", that is, the page from which you will start browsing Web resources.

Temporary Internet Files

As you know, to speed up viewing of pages that you have already visited, they are cached on your computer's hard drive and stored for a certain time in the Temporary Internet Files folder. This storage arrangement speeds up the display of frequently visited Web pages, since the browser can open them from your hard disk rather than requesting a second time from the Internet.

In order to evaluate what resources are available directly from your computer, open the folder Favorites, run the command File à Work offline and pay attention to your panel Favorites. Site names that are not available in offline, will turn gray, and those whose information is cached on the hard disk will be highlighted in black (Figure 7).

Obviously, the more space you provide on your computer for cached pages, the more likely it is that the newly requested information will be saved on your disk. In order to increase the Internet cache, go to the tab General to section Temporary Internet Files and select the item Options, as a result of which the panel of the same name will appear (Fig. 8), in which you can configure the value of the maximum allowable folder size for storing temporary Internet files.

Increasing the space reserved for the folder storing temporary files may increase the likelihood of previously viewed Web pages in your computer's cache, but it will obviously decrease the amount of free disk space.

In the next screen of the wizard (Fig. 10), you can set the mode in which the subscription will also occur to those pages that will be linked to. base pages... Moreover, you can set the depth of the links.

Next, you will be prompted to select a method for synchronizing the page (Fig. 11). There are two options: by the "synchronize" command or by using a new schedule.

If you choose the "new schedule" mode, the wizard prompts you to define the synchronization frequency and specify the synchronization time (for example, every day at 23:00).

Privacy Tab

Internet Explorer protects the user's privacy and the security of his personal identification information.

Internet Explorer privacy tools include:

  • safety parameters that determine the processing mode cookies;
  • Privacy Alerts informing you that a Web site you are opening does not match your selected privacy settings.
  • the ability to view the privacy policy of the P3P Web site (Platform for Privacy Preferences Project, P3P.

Due to the support of RZR, servers that collect information about visitors (primarily online stores) and ignore this format may be blocked.

The category of confidential information protected by P3P includes the user's personal data: his real name, e-mail address etc. Protected information is also information about the web resources visited, recorded in cookies.

To ensure compatibility with the P3P protocol, a web resource must describe its privacy policy, that is, determine what information about users it records, how it stores it, and what cookies it creates. This description formalized in accordance with the P3P specification and placed in the root directory of the site. Internet Explorer reads this file and receives the necessary information.

The main channels for leakage of confidential information are third sites (they are also called third-party sites), that is, sites to which the user addresses in parallel with the site being viewed. Any Web site that does not appear in a browser window is called a third party. The Web site you are browsing may contain content from third-party Web sites, which in turn may use cookies.

In Internet Explorer 6.0, the default security level is to block cookies from third-party sites that:

  • incompatible with P3P, that is, they did not declare their privacy policy;
  • request personal information without the explicit consent of the user;
  • request personal information without the user's implicit consent.

To change privacy settings, in the tab Confidentiality move the slider up to increase the level of protection and down to set more low level protection (fig. 14). The description of the adjustable modes is given in the table.

It should be noted that changing the privacy mode does not affect the cookies already stored on your computer.

By pressing the button Additionally on the panel (fig. 14), you will go to the panel where you can define Extra options Privacy: disable the automatic handling of cookies and define the mode of acceptance of first-party and third-party cookies (Figure 15).

Security tab

Internet Explorer divides the Internet into zones of different security levels, which allows you to assign the required level of protection to each Web site.

Local intranet (Local Zone)

Typically, this zone contains all addresses that do not require a proxy server to access. The default security level for the local intranet zone is Medium. Therefore, Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites on which they were created.

Internet Explorer privacy settings let you control how cookies are handled for all Web sites or for each Web site individually.

Reliable nodes

The Trusted Sites zone is set to low security by default. Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites on which they were created.

Limited nodes

For this zone, the default is high level security. Internet Explorer will block all cookies from Web sites in this zone.

Contents Tab

Access limitation

If you use a computer at home and are afraid that your children can view those pages that you want to restrict access to, you can use the settings located on the tab Content on the panel Internet options(fig. 19).

You can restrict access to thematic groups of sites or set a strict ban on access to specific sites.

It is quite difficult to protect a child from visiting all sites of a certain subject, but if you have information about specific sites to which you want to block access, it is naturally much easier to do this. For example, in the tab Allowed nodes you can specify a list of sites prohibited for viewing (fig. 20).

Authentication problem

Authentication is the foundation of communication security. Users must be able to prove that they are who they say they are, and at the same time must be sure that their correspondents, in turn, do not impersonate someone else. It is more difficult to do this online than in real life, primarily because we, as a rule, cannot personally meet with the partner providing this or that online service. However, even in the case when you see your partner, the problem of identification does not disappear - which is why there are passports, driver's licenses, etc. To authenticate partners on the Web, you must have the appropriate certificates. Before talking about the settings, let's recall the purpose of the certificates.

Certificates

A certificate is a document that identifies the owner or security of a Web site. It is a set of data that allows you to identify a correspondent. Certificates are used to protect personal identity on the Internet and to protect your computer from unsafe software.

An organization with a high trust status can issue certificates that allow a public key to be associated with the identity of its owner. Such an organization is called a Certification Authority (CA), or certification authority.

Internet Explorer uses two types of certificates: personal certificates and Web site certificates.

A personal certificate is used to verify the identity of a user who visits a Web site that requires a certificate. A Web site's certificate validates its identity to those clients who request a service from it.

A Web site "identity" certificate is required, for example, when sending confidential information over the Internet to a Web site or downloading software from the website.

The basis of authentication is public key encryption. The certificate maps an identifier to a public key. The corresponding private key is known only to the owner of the certificate, who uses it to digitally sign or decrypt the data encrypted with the corresponding public key.

The digital signature on the certificate is the electronic identification of the user, which informs the recipient that this information really came from a specific correspondent and was not changed at the delivery stage. When a user accesses a secure Web site, the latter will automatically send its certificate to the user. As a result, the user will receive a notification that the connection is safe and the data transmitted by the user will not be available to third parties (Fig. 21), while when requesting more detailed information from the IE browser, it will explain the mode of visiting the protected site (Fig. 22) ...

To be able to send encrypted or digitally signed messages yourself, the user needs to obtain a personal certificate and configure Internet Explorer to work with it.

Checking Web Site Certificate When Downloading Software

There may be several situations when it is important for you to know that the server with which you are going to exchange data belongs to exactly the company to which it considers itself. Let's take a common example - buying or downloading free software from the Internet.

When you buy boxed software in a regular (non-electronic) store, you receive a sealed box with the product, so you can track if the packaging is not broken, and in most cases you do not doubt who produced the software product. Another thing is when you download a product from the web. In this case, you do not know whether the supplier of this software is exactly who it claims to be, and the downloaded software does not contain viruses, is complete, reliable, etc.

Decide this problem Allows the introduction of an Authenticode into the Distributable Product. This technology empowers software developers through the use of digital signature include information about the developer in the distributed programs. When users download software that is signed with an authentication code and certified by a CA, they can be sure that they are receiving the software from the company that signed it and that the software has not been changed after signing.

Such a system is the basis for protecting consumer rights, for example, in case of viruses in the code. Based on code authentication, users can securely receive signed ActiveX controls, signed Java applets, and other applications.

Software developers are also interested in authenticating a Web-based product, as this makes it difficult to counterfeit their software.

Any company wishing to distribute software or content over the Internet needs such a system.

Client Microsoft programs such as Internet Explorer, Exchange, Outlook, Outlook Express, come with security systems that already include an authentication system for program code downloaded over the Internet. This is necessary primarily because the aforementioned systems are designed for replenishment from the Net. According to the component model, elements such as ActiveX or Java applets can be downloaded to your computer when you browse a Web site. When a user visits a Web page that needs to play an animation or sound, code is often loaded onto the client machine to perform the required function. In this case, the user runs the risk of downloading a virus or other unsafe code. In order to secure the user, a system of signed applications exists.

If a user of the above client applications encounters an unsigned component, the following will happen:

  • if the security system of the application is configured for the "High security" mode - the client application will refuse to download the code;
  • if the application security system is configured for the "Medium security" mode, the client application will issue a warning (Fig. 23);
  • if, on the contrary, the user encounters a signed applet, the client program will display another message (Fig. 24).

Having received confirmation of the authenticity of the downloaded software, the user understands that, firstly, the software that he is going to download really belongs to the publisher, and secondly, he knows that authentication was provided by such and such a center, and represents where to get Additional information in order of authentication. In this session, users can trust the further download procedure. Users can also select the "Always trust download from this publisher" command to speed up the verification process in the future.

Users can always get additional information about the certificate (Fig. 25).

Installing Publisher Certificates

Certificate issuers create for themselves special, so-called root, certificates that confirm the authenticity of their private keys. Each particular type of certificate has its own root certificate: one for e-mail certificates, one for full personal certificates, and one for servers. Usually browsers come with a set of these certificates.

If, while browsing the Internet, you come across a server with a certificate issued by an unknown publisher, you will be prompted to accept this certificate and, if it contains the root certificate of the same issuer, you will be offered the opportunity to install this certificate and assign actions to servers with certificates received from given publisher.

Using digital certificates can ensure the security of your online transactions because it allows you to associate the identity of the certificate holder with a pair of keys (public and private).

Obtaining a personal certificate

So far, we've talked about the need for servers to prove their authenticity. However, in some cases, servers require confirmation of the client's identity. Therefore, now we will talk about personal certificates. There are several categories of trustworthiness for certificates issued by independent certification authorities.

Personal certificates are used to verify the identity of a user at the request of some sites that provide a particular service. Certificates are issued by the same certificate issuers, that is, a third party trusted by both the user and the service operator.

To obtain a certificate, you must register with the certificate issuer of your choice.

Usually, to obtain a certificate, you need to provide the issuer of certificates by mail, and sometimes personally, certain documents, and then pay for the certificate.

The procedure for obtaining a certificate is as follows: you go to the certificate issuer's Web server, fill in the data required to obtain a specific certificate, and select the length of the private key (preferably at least 1024 bits). Before submitting the form, your browser will generate a public (public) and private (private) key pair and enter them into a password-protected database. Private key known only to you - it should not be known to anyone else, including the certification center. On the contrary, the public key is sent along with other entered data to the certification authority for inclusion in the certificate. It is impossible to determine the pair of the public key - the private key.

After issuing a certificate, the certification authority usually sends you a certificate or specifies a URL where you can download it. After downloading the certificate from the certificate issuer, the browser automatically starts the installation procedure.

Installing and Removing Certificates

Internet Explorer has a certificate manager - Internet Explorer Certificate Manager (Figure 26).

It allows you to install and remove client certificates and certificates of certification authorities, or, as they are also called, CA (from the English Center Authority). Many CAs already have root certificates preinstalled in Internet Explorer. You can choose any of these pre-installed certificates to verify the authenticity of the code, the validity of the time stamped in the documents, secure mail, etc. In order to install or remove certificates, go to the tab Content... Select item Certificates and then the corresponding tab. The following tabs are available: Personal, Other Users, Intermediate Certification Authorities, Trusted Root Certification Authorities, etc.

Certificates in category Personal have matching private keys. Information signed by means of personal certificates is identified by the user's private key. By default, Internet Explorer places all certificates that identify a user (using a private key) into a category Personal.

In the tab Trusted Root Certification Authorities usually, root certificates are already preinstalled, which you can view and get all information about them: by whom they were issued, their validity period, etc. (fig. 27).

By clicking on one of the certificates, you can get additional information about it, including the composition and the certification path (Fig. 28).

Setting up a proxy server in Internet Explorer

As you know, modern browsers such as Internet Explorer and Netscape Navigator have internal cache settings that allow you to determine the amount of disk space on your machine that will be used to cache documents you have already viewed. The browser periodically refreshes the documents in the cache to keep them fresh. However, the amount of cache on a PC is usually small, since PC users rarely allocate more than a gigabyte of disk space for caching, so the amount of stored documents is small. It is difficult to allocate a large amount of memory on a local computer, but this can be done on the provider's proxy server - a computer running a special program that caches data requested by all clients of a given provider. Large providers can allocate tens or even hundreds of gigabytes to their customers. Some users fear, however, that using cached documents from a proxy server, they will receive outdated documents, but there is technology to avoid this.

There are a number of criteria by which a decision on caching on a proxy server is made. For example, if an object is marked as confidential, then it will not be cached. Similarly, there are criteria by which a decision is made about the possibility of sending a cached document to a client's request. For example, if a document has passed the expiration date, the server will not send it to the client, but will request a fresh document. Thus, fresh documents (with an expiration date) are provided immediately, and if the proxy server doubts that the document is fresh, it can ask the Web server if the document has changed. It is possible that an expired document is not actually out of date because it has not been updated, in which case the Web server will respond to the proxy server that the document has not yet been "corrupted" and can be submitted to a client request. In other words, there is every reason to use a proxy server.

In order to set up a connection through a proxy server, go to the tab Connections on the panel Internet options(fig. 32) and instead of paragraph Never use(which you probably had configured if you weren't working through a proxy) select Always use the default connection.

Then refer to item Customization, which will lead to the appearance of the panel shown in Fig. 32.

Check the box Use a proxy server for this connection and enter the proxy server address and port - these addresses should be obtained from your ISP. I use the services of Zenon and in my case it is proxy.aha.ru. Then go to the item Additionally(fig. 33) and indicate One proxy for all protocols.

It should be noted that work through a proxy server is not always optimal. The most obvious example is if you have faster access to some Web server than to a proxy server, then there is no point in accessing a proxy server. Or, for example, if you are debugging Java applets on some server and you need to constantly watch how your software is working correctly, then, of course, you will not be satisfied with downloading previous version applet. The panel shown in Fig. 33 Additionally, Play video, as a result, pages will load faster.

After you have removed the display of images and loaded the page, it will be displayed in a "trimmed" form, as shown in fig. 37. There will be icons instead of pictures. By right clicking on such an icon, you can invoke context menu and view the required drawing.

ComputerPress 11 "2002

Choose a section Configure for work on electronic trading platforms.

Possible mistakes

If, when working on the ETP, one of the windows with an error appears:

"Error! The CAPICOM library could not be loaded, possibly due to low access rights on this local machine. "

"CAPICOM object not installed"

“On your computer, there are no or incorrectly configured tools for working with EDS. Please contact the supplier of your certificate and SKZI. "

"The object cannot be created by the object programming server."

"Your browser does not have permission to use ActiveX objects."

then you need to follow the steps described below.

How to customize Internet Explorer

1. Make sure you are using Internet Explorer. If your version of Internet Explorer is lower than 10, then you need to run the 32-bit version (to do this, open the C: \ Program Files (x86) \ Internet Explorer folder and run the iexplore.exe file).

If you have operating system Windows 10, make sure you're not opening a browser Microsoft Edge whose icon is very similar to Internet Explorer.

2. It is necessary to add ETP addresses to Trusted sites.

  • In Internet Explorer "Service" - "Internet Options" ("Browser Options"); go to the "Security" tab;
  • select "Trusted sites" ("Trusted sites"); press the button "Sites" ("Sites");
  • uncheck the box below “For all nodes in this zone, server verification (https :)” is required (not all ETPs work via a secure https: // connection);
  • enter the ETP address (via http and https) into the line “Add the next node to the zone”;
  • insert the site url, after the double slash // put *. and the site address. The entered address should take the form "http: //*.kontur.ru/";
  • click the "Add" and "OK" buttons.

3. For the "Trusted sites" zone, enable the use of Active-X controls.

  • in Internet Explorer "Service" - "Internet Options"; go to the "Security" tab; highlight "Trusted sites"; press the button "Other ...";
  • in the "Active-X elements and plug-ins" section, check "Enable" for all parameters.

4. Download and install CAPICOM-KB931906-v2102.

5. In IE 9 and above, errors may occur that can be resolved using the compatibility mode (Go to Internet Options - Tools / Compatibility View Mode Options / Add Site Address).

Note: these are general settings for all ETPs. On some sites, it is necessary to install additional components (for example, the CRiptoPro EP browser Plug-in) required for the site to work correctly.

If you believe the statistics, then internet explorer is one of the most popular browsers. The popularity of the Internet browser is due to the fact that it is installed in Windows by default, and the user does not need to download the program additionally. Despite the fact that some webmasters sometimes complain about this application, it still continues to occupy a leading position. For today latest version-, ships on Windows 8 devices, although it is available for other operating systems from Microsoft. Actually, let's talk in more detail about what should be the setting for the internet explorer browser.

First launch of internet explorer

The first time you launch your browser, a welcome window will open. If we are talking about how to configure internet explorer 8, then here will be a proposal to speed up the program using add-ons. After you click Next, you will be presented with a window in which you can configure the settings for the recommended websites. When you activate the Featured Sites feature, your browser will offer you a list of resources based on which pages you have visited most frequently.

The next window that opens is the parameter selection. You can leave them as default or change any settings of your choice. If you choose special parameters, then the user gets the opportunity to customize the browser as it suits him.

Next, a window will open in your Internet browser in which you can select a search provider. In other words, these are search engines that can be accessed in the program itself. After installing the provider, in order to use its services, you will not need to go directly to the website. Its designation appears on the browser toolbar. In order to select a resource, put a check mark next to the inscription, which means that after installation, show a page for selecting a search provider. If you leave this setting at the default, you will still go to search engines, which takes time. Therefore, I advise you to mark google, yandex or another resource here. How to make Yandex home page you will learn in more detail.

If we talk about whether it is necessary to search for updates for search services, then it should still be noted that the browser searches for them automatically. The Internet browser is equipped with various additional tools. So, we can note accelerators that will help you get instant access to the most frequently visited pages. Browser Settings Wizard will prompt you to enable or disable this function... Some users note that it can slow down the work of the Internet browser, so they prefer to deactivate it. Actually, you can always change the settings, but first I advise you to study accelerators, perhaps you will like them.

SmartScreen Filters provide protection against malware and phishing programs. Turning them on or off is everyone's business. However, taking into account the fact that the number of cases of infection of computers has become more frequent, increasing the security when connecting to the Internet will not hurt. In versions 8 and higher, there is such a parameter as viewing in security mode, speaking about how to configure the internet explorer browser, you cannot forget about it. It is necessary when visiting web resources optimized for more early versions browser. Everyone can evaluate how convenient and useful this mode is by turning on the function. Do not forget that you can always turn it off in your browser settings.

Completing the initial setup

After the internet explorer customizer exits, if you did everything as indicated above, three windows will appear in front of the user. First, this is the browser home page. In addition, windows with a list of accelerators and search services will open. The latter can be initially added to bookmarks, since in the future they may be useful, for example, for changing these parameters and installing updates.

You can select several search services, and then click the Finish button. You can find them in the upper right part of the browser. We do the same with accelerators, mark those that you need, and confirm our actions. When might accelerators be needed? For example, if you have chosen a translator as an add-on, then by opening any page in the browser, you will need to select the text of interest. Next to it you will see a blue arrow, after clicking on which you will see a list of accelerators. Choose a translator and get a ready-made translation of the text almost instantly.

Now let's look directly at the browser interface. At the top of the screen, you will see several panels, on which the most various tools helping the user on how to set up internet explorer 10 or another version of the browser. Command line contains the same buttons as in the browser menu, however, it is intended for quick access to them. Usually, each button has its name written, which can be changed by going to Settings and choosing to display as icons.

Browser settings are located in Tools - Internet Options. Before configuring internet explorer 11 or earlier, you should carefully study what is proposed by the developers. So, here you can change home page... To do this, you need to go to the General tab. If you want to load empty page, click on the button of the same name. In the address field, you can enter the address of the tab from which you want to boot.

The listed settings are far from all that are offered in internet explorer. And the developers have endowed the latest versions of the browser with additional features that make the work with the Internet browser more comfortable. You should not be afraid to experiment and change the parameters, because if you want, whenever you want, you can always, if something does not suit you.

If your browser is slow, it isn't necessarily a bad internet connection. 3rd party toolbars, some add-ons, cookies or not best parameters settings can also hinder high browser performance.

Here are some simple steps you can take to optimize your Internet Explorer browser:

More ideas that might be helpful:

Removing toolbars

Many toolbars downloaded and embedded in the browser affect more than just the browser appearance but also slow down the movement of internet traffic.

The browser toolbar is an add-on (extension) added to its interface. While some browser add-ons can enhance your online experience and can be very useful, others have negative consequences. They can easily set themselves to "default" status by bundling with the widely used free apps and they sometimes interfere with or conflict with other software on the computer.

Each toolbar carries its own specialized functions such as search functions, emoticons, music player etc., thus, they will require additional resources for their work.

In order to remove some of the toolbars, you will need to open the list of installed programs (in Windows 7, click Start(Start)> Control Panel(Control Panel) and under Programs(Programs) click Removing a program(“Uninstall a program”) - uninstall programs that you never use).

Right-click each toolbar in the list that you would like to remove and select Delete(Uninstall). After you complete this process, the toolbars will be completely removed.

Disable toolbars and add-ons right in the browser

2. Click the button Service(in the form of a gear) in the upper right part of the window, then select Configure add-ins(Manage add-ons).

3. Under the inscription Display(Show) select All add-ons(“All add-ons”).

4. Select each add-on you want to disable and click Disable(Disable).

5. When you're done, close the window and restart your browser.

Clearing cookies and clearing browser cache

Few people remember to do this, and in the end HDD turns out to be overwhelmed with a large amount of data stored by the browser for years.

To clear your browser cache:

1. Open Internet Explorer.

2. Click the button Service(Tools), hover over the item Security(Safety) and select Delete browser history(Delete browsing history). If you do not want to delete the cookies and files of the websites in the favorites list, select the checkbox Save data of selected websites(Preserve Favorites website data).

3. Check the boxes next to the types of data that you want to delete.

4. Click Delete(Delete).

Reset browser settings

Sometimes, when you install a program, it can change your browser settings without your knowledge. You may notice that your browser is behaving strangely.

If Internet Explorer stops responding to commands or works in general, if you encounter error messages saying that Internet Explorer will close, or if you experience a noticeable slowdown, you might want to reset your Internet Explorer settings. To do this, follow the steps below.

1. Start Internet Explorer.

2. Click the button Service(Tools), then select Browser properties(Internet Options).

3. In the window Browser properties(Internet Options) click the tab Additionally(Advanced).

4. Click Reset(Reset).

5. In dialogue ResetparameterssettingsInternet Explorer click Reset
Check the box Delete Personal settings (Delete personal settings) only if you want to delete the browsing history, search service settings, Accelerators, home pages, Tracking protection and ActiveX Filtering data along the way. By checking this box, you are essentially launching a fresh Internet version Explorer.

6. When Internet Explorer finishes switching to default settings, click Close(Close), and then OK.

7. Close Internet Explorer and restart it.

Installing a new version of Internet Explorer

Upgrading to the latest version of Internet Explorer will make Internet access faster. In addition, your computer will be safer and it is very likely that the problems you have with your old browser will go away.

Using the following table, you can find out what the latest version of Internet Explorer you can use in relation to the operating system you are using:

To get the latest version of Internet Explorer, follow this link.

Switching to another browser

There are many internet browsers out there, each slightly different from the others. Some browsers have big amount functions, others are quite simple in this sense. Some perform slightly better than others. But all internet browsers basically do the same thing: they allow us to browse websites.

The most popular browsers are Google chrome, Mozilla Firefox, Internet Explorer, Safari and Opera. There are also other less popular browsers like RockMelt, Avant Browser, Maxthon, Deepnet Explorer, Flock, SeaMonkey, AOL Explorer, and more.

Switching from one browser to another is in most cases the fastest and easiest way to fix many of the problems we face. If your browser is overloaded with toolbars and plugins, if it won't open some websites, or if it takes too long to load content, you can try installing a different one and see if it works better.

To install a new internet browser, you will need to use the one you already have in order to find and download a different one. Just use search engine such as Google or Bing to find the browser you want to install and click the download link.

Here are the pages on our site for the most popular browsers that you can use instead of Internet Explorer:

You might also find a guide on how to optimize your Internet speed and performance when using Chrome and Firefox for help.

Based on materials from the Internet portal. Translation into Russian: Alexander Ryabov

And others malware, properly configured browser with the installation of the necessary add-ons and plugins. One of better means protection from all kinds spyware- latest version installed browser such as Internet Explorer 11.

To protect the IE browser, it is advisable to disable unnecessary (or not used) browser settings, possibly vulnerable to external attacks. For advanced security settings, follow these steps:

Turn on pop-up blockers on websites you don't know. This security function allows you to select the desired blocking level. When you visit websites, you will receive pop-up blocking messages. You can also create a list of sites in advance where pop-ups will not be blocked.


The sites on your list will display pop-ups as usual. To enable pop-up blocking, click on the "Tools" button, and select "Browser options". Next, the "Privacy" tab, the "Pop-up blocking" section, where check the "Enable pop-up blocking" box and agree to the changes with the OK button.


Please note that this feature will not block pop-ups from websites within your local intranet or your trusted sites.

To block absolutely all pop-up windows, move the security level slider up. In addition to the default "Medium" mode, there are three more higher degrees of protection.

Protected mode.

Another browser protection setting is Protected Mode. This feature will help prevent malware from running in your browser. To enable Protected Mode, again click the "Tools" icon, "Internet Options". On the Security tab, select the Enable Protected Mode check box and click OK.


Protected Mode is configured separately for all zones: Internet, Local Intranet, Trusted Sites, and Dangerous Sites.

Disable ActiveX.

Internet Explorer's security has been dramatically improved by disabling ActiveX, Active Scripting, and Java. But, in this case, verified sites that also use these functions will not be able to load properly. Add them to your trusted list. To set Internet Explorer to the highest security level, move the slider all the way up and accept the changes with the OK button.

How to enable ActiveX for verified sites.

Click the "Tools" button, go to the "Security" option and check the box "ActiveX Filtering". Now, when you visit a web page with ActiveX controls, Internet Explorer will block them. The ActiveX filtering icon is displayed in the browser address bar. Clicking on the icon will enable the ActiveX for that particular web page.

Disable Java scripting.

Java scripts create interactive web pages, but are also an open gateway for malware. Include Java scripts only for trusted websites. To disable them - the "Security" tab. Click the Custom button and scroll down to the Run Scripts ... Java heading.