![]() ![]() Web sites in less privileged web content zone can navigate into this zoneĬlick OK when you’re done changing the security settings. Open files based on content, not file extension Navigate sub-frames across different domains Launching programs and files in an IFRAME Script ActiveX controls marked safe for scriptingĪllow scripting of Internet Explorer Webbrowser controlĪllow script-initiated windows without size or position constraintsĪllow web pages to use restricted protocols for active contentĭon’t prompt for client certificate selection when no certificates or only one certificate existsĭrag and drop or copy and paste files to/from Explorer Initialize and script ActiveX controls not marked as safe Run components not signed with Authenticode Choose the Security tab, select the Internet icon at the top, and then click the Custom Level button to display the Security Settings dialog box, shown in Figure 4-1. Open the Windows Control Panel and open Internet Options (or, in IE, go to Tools → Internet Options). ![]() If you want to stick with Internet Explorer for now, you can take steps to make it safer. Despite these problems, Microsoft has too much corporate strategy tied up in this design to change it now, which leaves you with two choices: hobble Internet Explorer by turning off the most dangerous features, or use a safer alternative such as Mozilla Firefox (more on that later). But it didn’t take long for unscrupulous hackers and greedy corporate executives to learn how to exploit Internet Explorer’s open nature, which is why we now have spyware, adware, browser hijackers, pop-ups, and other nasty surprises. ![]() At first, web site designers used this capability sparingly, mostly to install widgets and small helper programs to add trivial features to their pages. But the larger issue is IE’s underlying design-and its cozy connection with the underlying operating system-which permits any web site to install software on your PC. THE FIX: Over the years, Microsoft has fixed dozens of security holes in Internet Explorer, and if you’ve been using XP’s Windows Update feature regularly, you already have these patches installed. Has Microsoft fixed these problems? If not, why not? Sounds like a win-win situation all around.THE ANNOYANCE: I’ve heard that Internet Explorer is riddled with security holes. Is there any way to re-order the pulldown menu selections under the Attachments to make the Inline full-size image choice the default one? That would save lots of mouse clicks for everybody: the person who posts won't have to do couple of extra clicks to post a full-size image in their thread, and all the people viewing the post later will not have to click on the thumbnail to expand it. The person posting saves 2 mouse clicks, but then everybody viewing the thread has to click on the image to see it full size. So if the person uploading the photo does not do two extra mouse clicks to select Inline full-size image (or doesn't even realize that a full-size image option exists) the image ends up as a thumbnail. The default attachment type is End-of-post expandable thumbnail. But I think that I finally figured this out. There is no advantage to selecting thumbnail. I tried to come up with a reason as to why someone would upload a photo but instead of Inline full-size image choose to select a thumbnail. So does every other person who reads that post. If someone has a dozen photos in their post (like it often occurs on the weekend update threads) I have to click on every photo's thumbnail to see the photo. This means that I have to click on each thumbnail to see the full size image. When viewing posts with photos attach to them (where photos are stored on TRW) those photos very often show up as thumbnails. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |