Windows 7

You can also visit my other blog at www.softknowledge.wordpress.com

Tips and Tricks

You can also visit my other blog at www.softknowledge.wordpress.com

How To(s)

You can also visit my other blog at www.softknowledge.wordpress.com

Downloads

You can also visit my other blog at www.softknowledge.wordpress.com

Wallpapers

You can also visit my other blog at www.softknowledge.wordpress.com

Quote of the Day

Showing posts with label IE. Show all posts
Showing posts with label IE. Show all posts

Saturday, November 26, 2011

Start Internet Explorer 9 in Private Mode

Start Internet Explorer 9 in Private Mode

For all you Internet Explorer 9 users out there, how would you like to learn a quick trick so that every time you start IE, it runs in Private mode right from the start ?

What we’re going to do is create a desktop shortcut for IE and set a switch to make it start in InPrivate mode. So, right-click on your desktop, select New and choose Shortcut.



Now, if you’re using a 32 bit version of Windows, copy this text and put it in the path box:

“C:\Program Files\Internet Explorer\iexplore.exe” -private



For those out there running 64 bit windows, you have to change it a bit. Use this line:

C:\Program Files (x86)\Internet Explorer\iexplore.exe -private



Notice that in both cases we put -private after the quoted path.

When you’re done, hit Next, give your shortcut a name and you’re good to go.

Note: if you get an error while inputting this path, you might have a different version of windows and should try the other path.

Tuesday, March 16, 2010

Features of Google Chrome inside Internet Explorer


Experience features of Google Chrome inside Internet Explorer

Google has released Chrome frame, an open source plugin that allows Internet Explorer to use the HTML 5 technology for more advanced websites. It adds the features like HTML 5 support, better Java script support, webkit and v8 engines for rendering pages in Internet Explorer.

If you don’t want to move to Google Chrome from IE then you can add this plugin to your Internet Explorer and enjoy the features of Google Chrome on your Internet Explorer. The addition of this plugin makes the Microsoft browser fast and compatible with the sites using advanced technology.

The developers can use this plugin by invoking it using meta tag. All you have to do is add some html code in the header of your file.

http-equiv="X-UA-Compatible" content="chrome=1">
For more information check out the Google Chrome Frame Developer’s Guide

Wednesday, March 10, 2010

Script debugging

Script debugging 

Before I learned how to shut off this "feature", I too would be surfing along when suddenly an error message would pop up on a website asking me if I want to debug script errors. Even if I did know how to fix the script error, all I could do is email the webmaster and hope that the next time I went they would have it fixed.

The Microsoft Script Debugger lets you test scripts developed using an ActiveX script engine, plus you can debug scripts developed with VBScript and JScript, as well as ActiveX components and Java applets. It lets you view and modify program source code, variables, and values, or control the flow and pace of how the script works.

Huh? What does that mean to you? Well, unless you are a programmer with nothing to do but fix script errors on someone else's web page, then you probably want to shut this off. It's really easy to do...

Open Internet Explorer and click Tools / Internet Options then click the "Advanced" tab. Under "Browsing", place a check next to "Disable script debugging".



Click OK .


Now you can visit pages with poorly written scripts and your browser will load them to the best of its ability without asking you to fix the problem. You probably won't even notice an error anyway. Here's to smooth surfing!

Wednesday, March 3, 2010

Microsoft Security Advisory - Vulnerability in Internet Explorer

Microsoft Security Advisory (980088)
Vulnerability in Internet Explorer Could Allow Information DisclosurePublished: February 03, 2010 | Updated: February 10, 2010

Version: 1.1
Microsoft is investigating a publicly reported vulnerability in Internet Explorer for customers running Windows XP or who have disabled Internet Explorer Protected Mode. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.
Our investigation so far has shown that if a user is using a version of Internet Explorer that is not running in Protected Mode an attacker may be able to access files with an already known filename and location. These versions include Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service 4; Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4; and Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, and Windows Server 2003 Service Pack 2. Protected Mode prevents exploitation of this vulnerability and is running by default for versions of Internet Explorer on Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008.
The vulnerability exists due to content being forced to render incorrectly from local files in such a way that information can be exposed to malicious websites.
At this time, we are unaware of any attacks attempting to use this vulnerability. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.
We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers. In addition, we are actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.
Microsoft continues to encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at Security at home.
Mitigating Factors:
Protected Mode prevents exploitation of this vulnerability and is running by default for supported versions of Internet Explorer on Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker’s Web site.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.
By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone.
By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone. The Restricted sites zone helps mitigate attacks that could try to exploit this vulnerability by preventing Active Scripting and ActiveX controls from being used when reading HTML e-mail messages. However, if a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.

Resources:

You can provide feedback by completing the form by visiting Microsoft Help and Support: Contact Us.
Customers in the United States and Canada can receive technical support from Security Support. For more information about available support options, see Microsoft Help and Support.
International customers can receive support from their local Microsoft subsidiaries. For more information about how to contact Microsoft for international support issues, visit International Support.
Microsoft TechNet Security provides additional information about security in Microsoft products.
Disclaimer:
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Monday, February 22, 2010

Take your bookmarks with you

Take your bookmarks with you
Would you like to take your favourites and bookmarks with you wherever you go? If you have a web-based email account (like Yahoo or Gmail) then you can. This is also a great way to send someone your favorites. My  favourites and bookmarks always travel with me.

First you need to create a 
bookmarks or favourites html file.

With Internet Explorer go to 
File / Import and Export to bring up the "Import/Export Wizard". Click "Next".

Select "Export to a file" then "Next". Put a check next to "Favourites". If your favorites are organized into folders you can choose to save all (that would be the top folder "Favourites", or just a specific folder.

image

Now choose a location where you'd like to save the file. I would select the "Browse" button and save it to my desktop for easy finding. Click "Next".

"Finish" and we're done with the first part.

You can export a list of Firefox bookmarks too: Go to 
Bookmarks at the top, select Organize Bookmarks and then Import and Backup. Select "Backup.." and choose a location and name (again, I suggest the desktop) then Save.

Once you have this file on your desktop you can open your email program, or bring up the email page on your browser, and create a new message. Make the recipient yourself, your friend, or your second address (some email servers block messages where the sender and recipient are the same).
You can open the Bookmark/Favorite HTML file in a seperate browser window and simply select all (Ctrl+A), copy (Ctrl+C), then paste (Ctrl+V) into the body of the email. This is the way to go if you will be checking your email from a public computer (library, internet cafe, etc.)
Another option is to attach the HTML file to the email so it can be saved/downloaded then imported back into Internet Explorer or Firefox on another computer.
After you decide which method to use, go ahead and send the email.When you receive the message, save it to a folder or flag it so it isn't deleted.
Now, wherever you go you can check your email online and access your links via this saved message.