Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 3 April 2010

Blocking Pop-Ups in IE

Posted on 10:16 by Unknown
A pop-up is any Web page that opens in its own separate browser window. Some pop-ups are OK. For example, a pop-up might open to display a larger copy of a small picture. Or it might open so that you can still see the page that contains the link that opened the page. Other pop-ups, such as advertisements, aren’t so great. These are often referred to as automatic pop-ups because they appear on their own, without your clicking a link.

Microsoft Internet Explorer has a built-in pop-up blocker to help you deal with pop-ups. To activate or deactivate the pop-up blocker:
1. Click Tools and choose Internet Options or choose Tools -> Internet Options from Internet Explorer’s menu.
2. Click the Privacy tab.
3. To block pop-ups, select (check) Turn on Pop-up Blocker. To allow all pop-ups through, deselect that check box.

If you opt to use the pop-up blocker, you can click the Settings button to configure it to your own tastes. When you click the Settings button.

First you can choose how aggressively you want to block pop-ups (remember, they’re not all ads). Use the Blocking Level drop-down list at the bottom of the dialog box to choose one of the following blocking levels:
• High: Blocks all pop-ups, even when you click a link to open the pop-up. If you choose this setting, you have to hold down the Ctrl and Alt keys while clicking a link to allow a legitimate pop-up page to open.
• Medium: Blocks most automatic pop-ups, but not pop-ups that open when you click a link.
• Low: Blocks relatively few pop-ups. Always allows pop-ups from secure and trusted Web sites.

The Notification options let you hear a sound and display the Information bar when a pop-up is blocked. It’s a good idea to select both those options so that you know when a page has been blocked. That way, you can decide whether you want to allow a Web site to show pop-ups. (Remember, not all pop-ups are bad.)

If you already know that you want to allow pop-ups from a specific site, you can type the site’s URL under Address of Website to Allow and then click the Add button. Doing so is not really necessary, however; if you choose the Show Information Bar when a pop-up is blocked option, you can allow sites as you go. Click the Close button at the bottom of the Pop-up Settings dialog box after making your selections. Then click OK to close the Internet Options dialog box.

Source of Information : Windows 7 Bible
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows 7 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ▼  April (21)
      • Windows Deployment Platform Components - Answer Files
      • Windows Deployment Platform Components
      • Windows 7 Deployment Terminology
      • Windows 7 deployment
      • Service Accounts
      • Smart Cards
      • Windows Biometric Framework
      • Safe Unlinking in the Kernel Pool
      • Auditing Enhancements
      • Internet Explorer Security Features
      • UAC Improvements in Windows 7
      • Enabling Non-Administrators to Make Configuration ...
      • Admin Approval Mode
      • User Account Control
      • Multiple Active Firewall Profiles
      • AppLocker
      • Why IM
      • Introducing Windows Live Mail
      • Blocking Pop-Ups in IE
      • Personalizing IE tabbed browsing
      • Windows Explorer Versus Internet Explorer
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile