Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 19 January 2010

Internet Explorer 8 Security Features

Posted on 11:03 by Unknown
Internet Explorer 8 comes with Windows 7 and includes a vast number of security improvements that make this the safest version of IE yet. This section examines the security features Microsoft added to Internet Explorer 8. These features were absolutely necessary: ever since Microsoft integrated Internet Explorer with the Windows shell beginning in the mid 1990s, Internet Explorer has been a major avenue of attack against Windows.



InPrivate Browsing
Internet Explorer 8 can optionally run in a new InPrivate Browsing mode, effectively hiding your tracks as you travel around to the more nefarious parts of the Web or, what the heck, secretly shop for a spouse’s birthday present online. More specifically, InPrivate Browsing turns off IE’s ability to locally store or retain browser history, temporary Internet files, form data, cookies and user names, and passwords. It does allow you to download files and add sites to your Favorites. By default, IE add-ons like toolbars are disabled in InPrivate Browsing mode, but you can change that from Internet Settings if desired.

A related feature, InPrivate Filtering, is a first step in addressing the way in which many Web sites share data with each other. Consider a mainstream Web site like wsj.com, for The Wall Street Journal. This site is certainly reputable, but it utilizes advertising services that work across multiple non-WSJ Web sites. Once these services have collected information about you on wsj.com, they can track you across other sites that utilize the same services. This is usually innocuous, but it’s possible that a malicious site could take advantage of this capability and deliver dangerous content via other sites.

InPrivate Filtering provides basic protection against this potential kind of attack by preventing, by default, more than 10 cross-site calls. It’s not enabled by default, however, but once you enable it you have decent control over how it works. For example, you could lower the threshold for cross-site content (down to a minimum of three), choose to allow or block specific sites, and so on. It’s interesting to look at just to see what the sites you visit are up to. You might be surprised.



SmartScreen Filter
IE8’s SmartScreen Filter is the new version of the anti-phishing filter that debuted in IE7.
It’s been renamed to reflect the fact that it now performs both anti-phishing and antimalware functions, protecting you and your PC from electronic attacks. So if you attempt to browse to a site that is known to deliver malware, or you attempt to download a known bad file, IE8 will prompt you with a warning.

You can manually check the current Web site if you’re unsure of something. When you do so, the SmartScreen Filter tells you what it knows about the site. You can also report a Web site that you think might be fraudulent. Microsoft says that almost 50 percent of the data in its SmartScreen database comes from users.



Address Bar Domain Name Highlighting
It seems like a small thing, but IE8 also highlights (bolds) the domain name in the URL, helping to ensure you’re visiting a legitimate Web site. Consider the following complex (but imaginary) URLs to see why this is important:

https://secure.winsupersite.com?key=10923
https://secure.winsupersite.com.h4x.com?key=10923

If you weren’t paying attention—and who is, really?—you might miss the fact that the second address points to a malicious Web site. But when you highlight the domain name as follows, the difference is a bit more apparent. It’s like the third brake light on automobiles:

https://secure.winsupersite.com?key=10923
https://secure.winsupersite.com.h4x.com?key=10923



Other Internet Explorer Security Features
The list of Internet Explorer security features is vast, although you won’t likely run into most of them unless you’re truly unlucky. IE8 integrates with Windows Defender to provide live scanning of Web downloads to ensure that you’re not infecting your system with spyware, and it integrates with Windows 7’s parental controls as well as Windows Live Family Safety to ensure that your children are accessing only those parts of the Web you deem safe. In addition, various low-level changes prevent increasingly common cross-domain or cross-window scripting attacks and blocks malicious malware installation attempts.



Should Internet Explorer 8 somehow be compromised, there’s a way out. An
Internet Explorer mode called Add-ons Disabled Mode loads IE with only a minimal set of add-ons so you can scrub the system of any malicious code. You can access this mode by navigating to All Programs -> Accessories -> System Tools -> Internet Explorer (No Add-ons) in the Start menu. Alternately, you can use Start Menu Search to find Internet Explorer (No Add-ons).


Source of Information : Wiley Windows 7 Secrets (2009)
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows 7 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ▼  January (33)
      • Windows 7 - If the Printer Isn’t Found
      • Windows 7 - Installing a Local Printer
      • Windows 7 - Installing and Configuring a Printer
      • Windows 7 Printing Primer
      • Windows 7 Network Locations
      • What’s New in Windows 7 Networking
      • Windows XP with SP2: A First Look at Today’s Netwo...
      • Windows 7 UAC
      • How UAC Has Changed in Windows 7
      • How UAC Works
      • User Account Control
      • Understanding User Accounts
      • Internet Explorer 8 Security Features
      • Windows 7 - Action Center
      • Securing Windows 7 in Just Two Steps
      • Windows Security
      • Windows 7 - 32-bit vs 64-bit versions
      • Improving Windows 7’s Memory
      • Windows 7 Appearance and Performance Tweaking
      • Using Windows 7’s Performance Options
      • Windows 7 - Fine-Tuning Data Execution Prevention
      • Windows 7 - Improving Your Windows Experience Inde...
      • Windows 7 - Understanding Your Windows Experience ...
      • Windows 7 - Getting Your Windows Experience Index ...
      • Windows 7 - Advanced Printer Management
      • Windows 7 - Using the System Configuration Tool to...
      • Windows 7 - Printing Offline
      • Windows 7 - Starting Application Programs Automati...
      • Windows 7 - Understanding Automatic Updates
      • Windows 7 - Making It Boot Faster
      • Virtual Folders—A Short History Lesson
      • Windwos 7 - Virtual Folders 101
      • Windows 7 Changing Search and Indexing Settings
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile