Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

® Microsoft Office 2010 Browser and Basics.
Tutorial 8: Developing an Excel Application
Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation. All.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
Ch 11 Managing System Reliability and Availability 1.
Managing Local and Network Printer Chapter 11 powered by dj.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Windows Internet Explorer 7 – Illustrated Essentials Unit B - Getting the Most from Internet Explorer 7.
Data Security.
Pasewark & Pasewark 1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2007: Introductory.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Module 8: Managing Client Configuration and Connectivity.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IS 2101—FALL 2009 Chapter 6 Getting Started with Windows Vista 9/22/08 and 9/24/08 9/21/09 1 IS Fall 2009.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Managing, Organizing and Finding Files, Information, Shared Folders and Offline Folders powered by dj.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
| | Tel: | | Computer Training & Personal Development Outlook Express Complete.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
Windows Tutorial 4 Working with the Internet and
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
Tutorial 1: Browser Basics.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
AOL SELF-HELP Built into the AOL program are the answers to nearly any problem you might encounter when using AOL.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Introducing Microsoft Outlook Session Version 1.0 © 2011 Aptech Limited.
XP Browser and Basics COM111 Introduction to Computer Applications.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Productivity Applications.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
Windows Tutorial 5 Protecting Your Computer
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
Windows Vista Inside Out
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Configuring and Troubleshooting Internet Access Chapter 9 powered by dj

Chapter Objectives  Configure Internet Explorer 7  Use Pop-up Blocker  Work with IE7 Security and Privacy Options  Explain Remote Assistance  Explain Remote Desktop  Configure Windows Mail  Work with Windows Calendar and Contacts powered by dj

Recall  The various security threats are Virus, Worm and Spyware  Spyware is software that is installed on the user’s computer without the user’s consent. It runs on the background and performs undesirable tasks  A firewall protects the system from the outside threats by blocking the unauthorized traffic while allowing the authenticated ones to enter powered by dj

Configuring Internet Explorer 7  Internet Explorer 7 is the new version of the Internet Explorer web browser  Some of the components are :  Quick Tabs  Address bar  Tabs and New Tab  Instant search box  Command bar  Zoom  Favorites Center  Status Bar powered by dj

 Practical Activity: Demonstrate a procedure to subscribe to a RSS Feed. (10 min) powered by dj

Configuring News Feeds  News feeds also known as RSS, web, XML feeds  RSS mainly used for news and blog websites  Identify the RSS feeds on the currently opened website by viewing the orange color button in the command bar  After subscribing, you can get the regenerated items on the website in your RSS feed after a fix interval of time powered by dj

Configuring the Search Bar and Adding Search Providers  Many search providers for IE7:  AOL search  Ask Jeeves  Yahoo search  Microsoft live search  Use of instant search box  Use of address bar powered by dj

 Practical Activity: Demonstrate the procedure to add search providers to a search bar.(5 min) powered by dj

Pop-up Blocker  Pop-up is any Web page that opens in its own separate browser window  When any new window opens automatically, it interrupts while reading the content  Pop up blocker arise with the message ‘Pop- up blocked’ on the information bar when it identifies the incoming advertising window  By default the Pop up blocker is turned on powered by dj

 Practical Activity: Demonstrate a procedure to turn off a pop-up blocker. (2 min) powered by dj

Working with Custom Filter Levels  Pop-up blocker provides three levels for filtering pop-ups:  Low – Allows to open all the windows for a websites except those who take place automatically  Medium – Blocks most automatic pop-ups, but not pop- ups that open when you click a link  High – Suppress all the new windows including those windows that are opened by clicking on the link  Change the filter level as per your requirement powered by dj

Allowing Pop-ups from Certain Sites  IE7 also allows for adding pop-ups because some websites might not work properly if they are not allowed for generating the pop-up  By blocking the website, pop-up blocker prevents to appear the window powered by dj

 Practical Activity: Demonstrate a procedure to change the filter level. Demonstrate a procedure to allow pop- up blocker from a specific site. Ask the students to block a pop-up from a site. (15 min) powered by dj

Configuring Notification Options  When the pop-up blocker prevents the window to appear, informed by :  The Information bar appears with the message  In the status bar icon appears  A sound is played  Use of Information bar - Information bar appears where the Internet explorer display information about security, blocked pop-up windows and other activities powered by dj

 Question for group discussion – What is pop-up blocker? (2 min) powered by dj

IE7 Security and Privacy Options  Security is the most important because of increases Internet attackers  Configure security settings to protect your computer  IE7 for Windows Vista provides security features  Protected mode browsing  Phishing filter  Pop-up blocker  Security zone powered by dj

Introducing Website Certificates  Web certification provides secure transactions on the Internet  A padlock icon near the address bar for a secured website  Find an error message, if encounter the certificate expired or invalid problem  The Address bar color changes to:  Pink  Green  Yellow powered by dj

 Question for group discussion – What is Phishing filter? (2 min) powered by dj

Checking the misleading Websites using Phishing Filter  Phishing is a trick, used to hack personal or financial information through messages and website by the hacker  Phishing Filter runs in the background while you browse the web  If the visited side is on the list of reported phishing websites, Internet Explorer will display a warning webpage and a notification on the Address bar powered by dj

 Practical Activity: Demonstrate a procedure to turn on the phishing filter. Demonstrate a procedure to disable the Phishing Filter. (10 min) powered by dj

Using Security Zones  Websites can be assigned to the security zones by specifying the security settings Security ZoneSecurity LevelAllowed for adding sites manually InternetMedium – highNo Local InternetMedium – lowYes (but detect the site automatically) Trusted SitesMediumYes Restricted SitesHighYes powered by dj

 Practical Activity: Demonstrate a procedure to add a site to a trusted zone. (10 min)  Question for group discussion – What is trusted zone? (2 min) powered by dj

Managing Cookies  Cookies are small text files that store the user information on the computer  Types of cookies are:  Temporary or Session cookies  Persistent or saved cookies  First-party cookies  Third-party cookies  The privacy settings options for the Internet zone:  Block All Cookies  High  Medium High  Medium (default)  Low  Accept All Cookies powered by dj

 Practical Activity: Demonstrate a procedure to block all cookies from a Website. Demonstrate a procedure to do advance privacy settings. (10 min) powered by dj

Managing Web-based Information  Internet Explorer tracks different things such as :  Temporary Internet Files - Stores images, multimedia files and even full copies of web pages  Cookies – Small text files stores on the computer  History – Internet Explorer records and stores a list of all web sites that have been visited  Form data – It stores that data which you enter into a form on a websites  Passwords – The chosen password will be stored by the browser and make it avail the next time you visit that web page powered by dj

 Practical Activity: Demonstrate a procedure to delete the browsing history. (5 min) powered by dj

Remote Assistance  A technology that allows expert to connect to the remote computer to support user to troubleshoot the problem arises while working  Provides a direct connection between two computers over the Internet or a local area network  Windows Vista contains the Windows Firewall feature that create the blockage for end-to-end communication in Remote Assistance  To solve this trouble you have to enable the exception in Windows Firewall powered by dj

 Practical Activity: Demonstrate a procedure to enable the exception in Windows Firewall. Demonstrate a procedure to enable the computer for receiving Remote Assistance connections. (15 min) powered by dj

Activating and Securing Remote Assistance  Windows Vista enables to send the remote assistance invitation  For connecting two computers within a network by Remote assistance, the computer should be enabled for receiving Remote Assistance connections powered by dj

 Practical Activity: Demonstrate a procedure to create and send a Remote Assistance invitation through Help and Support and to create a Remote Assistance invitation.(15 min) powered by dj

Exploring a Remote Assistance Session  Remote Assistance invitation is file contains an encrypted string  The invitation file can be edited using the text editor such as Microsoft notepad  Windows Vista allows to send the Remote Assistance invitation using Help and Support center  Windows Vista allows to save the invitation message with another file name at different location at your computer powered by dj

 Practical Activity: Demonstrate a procedure to open the Remote Assistance invitation by Help and Support Center. (10 min) powered by dj

Using an Invitation to Establish a Connection  After receiving the invitation:  Open it by double-clicking the invitation file  Enter the password transferred by the host  Alternatively, you can open it by Windows Help and Support center powered by dj

Managing the Remote Assistance Session  Windows Vista provides the Remote assistance panel to manage the Remote Assistance session  The Remote assistance panel contains :  Disconnect  Request Control  Stop sharing  Pause  Settings  Chat  Send file  Help powered by dj

Troubleshooting Remote Assistance  Verify the network connectivity of both host and expert  Configure the windows firewall settings with its advanced security powered by dj

Remote Desktop  Similar to the Remote Assistance, but both are used for different purpose  Remote Desktop does not require anyone to be logged on or to approve the session powered by dj

Configuring Remote Desktop  Need administrative privileges. When you try to enable the desktop, three options available:  Don’t allow connections to this computer  Allow connections from computer running any version of remote desktop (less secure)  Allow connections from computer running remote desktop with network level authentication (more secure) powered by dj

Remote Desktop Users Group  By activating the Remote Desktop connection, you can not able to connect to all the users  Connect that user who has been added to your Administrators local group  For connecting another people, you can add the user account to Remote Desktop Users group powered by dj

Remote Desktop Connection Application  Windows Vista allows you to create a Desktop connection  Used with Aero Interface  Possible to view a good quality video using Remote Desktop over a LAN connection powered by dj

 Practical Activity: Demonstrate a procedure to enable the Remote Desktop on Windows Vista. Demonstrate a procedure to add a user account to the Remote Desktop Users group. Demonstrate a procedure to open the Remote Desktop connection application. (20 min) powered by dj

Troubleshooting Remote Desktop  Check that the user you are trying to connect should be a member of the Remote Desktop Users Groups  Verify that the firewall in computer must not be configured to allow Remote Desktop connections  The problem may occur due to the advanced security in Windows firewall  Extra firewall between both the computer’s might be blocking your connection powered by dj

Windows Mail  Windows Vista uses the new Windows Mail feature as the default client as well as newsgroup reader  Differences between Windows Mail and Outlook Express are :  File format  Contact information  Search Box  Junk filter powered by dj

Configuring and Using Windows Mail  Mails can be viewed by defining views  Contains a search tool  Allows to join various newsgroups, called communities  For the first time, the Internet Connection wizard opens to set up a mail account  Various settings can configured like rules, views, junk filter Types of search mode Simple search Advanced search powered by dj

 Practical Activity: Demonstrate a procedure to create a mail account. Demonstrate a procedure to create mail, attached a file and send an .(30 min) powered by dj

Troubleshooting Windows Mail  Unable to send messages  Unable to receive messages  Unsure whether your Windows Mail is working properly  Error message that says incoming or outgoing servers are not available  Mail box is full  Message moved to Junk folder powered by dj

 Practical Activity: Demonstrate a procedure to search an . (6 min) powered by dj

Windows Calendar and Contacts  Windows Calendar is a scheduling application  It supports iCalender  Windows Vista allows you to create a new appointment in Windows Calendar powered by dj

Creating New Contacts  Provides the flexibility to add a contact with minimal information like the name or nickname  Various other details like phone, address, website, work details, birthday, anniversary, family members and notes can be added  A contact can be created manually using the New Contact button powered by dj

 Practical Activity: Demonstrate a procedure to create a new appointment. (10 min) powered by dj

Creating a Distribution List  Windows Contacts allows you to put together a set of contacts to form a contact group called distribution list  Advantage - Do not have to manually select all the contacts one by one powered by dj

 Practical Activity: Demonstrate a procedure to create a new contact. Demonstrate a procedure to create a distribution list (Contact Group). (15 min) powered by dj

Summary I  Internet Explorer web browser provides the new version 7 (IE7). With IE7, the daily tasks such as searching, tabbed browsing, printing, viewing, discovering and subscribing RSS feeds becomes easier  By default, IE7 hides the toolbar. You can view the toolbar by pressing Alt key from the keyboard  IE7 provides the way to add a search provider to the search bar  IE7 provides the pop-up blocker features to prevent the interruption of automatically opened advertisement window. It provides you to apply the pop-up to the security zone  Pop-up blocker provides three levels for alertness Low, Medium and High powered by dj

Summary II  IE7 provides the phishing filter feature. This feature makes difference between the original and phishing site that prevents the attackers from stealing your personal detail  IE7 provides four security zones namely internet, local intranet, trusted sites and restricted sites  Cookies are small files that store the user information on the computer. Cookies are not usually harmful  A Remote Assistance invitation is an XML file that is automatically created by mail delivery software. The invitation file can be edited using the text editor such as Microsoft notepad. The invitation is saved by Invitation.msrcincident default name powered by dj

Summary III  The Remote assistance panel contains the controls such as Disconnect, Request Control, Stop sharing, Pause, Settings, Chat, Send file and Help  If the Remote Assistance session is not working properly, first you should verify the network connectivity of both host and expert. If the network connectivity exists, but still the Remote Assistance session is not working, you should configure the windows firewall settings with its advanced security  Remote Desktop connection provides different tabs such as General, Display, Local Resources, Programs, Experience and Advanced that are used for different functioning powered by dj