Using Security Features |
Security on the Internet
Controlling JavaTM access
Setting security alerts
The Internet works by sending information from computer to computer until the information reaches its destination. So, when data is sent from point A to point B, every computer in between has an opportunity to look at what's being sent. This can pose a security problem.
For example, suppose you are looking at a clothing catalog on the World Wide Web, and you decide to buy a shirt. This requires that you type certain facts into an order form, including your credit card number. You know the clothing company in question is reputable, so you type your credit card and other information, and then send the completed form. Your information passes from computer to computer on its way to the clothing company. Unfortunately, one of the computers in between has been infiltrated by criminals who watch the data passing through that computer until they see something interesting—such as your credit card number.
How often does something like this happen? It's hard to say, but the important thing is, it's technically possible. And, as the Internet grows, it's bound to happen more and more.
How does Microsoft Internet Explorer help to protect you and your data? Many Internet sites are equipped to prevent unauthorized individuals from seeing the data sent to or from those sites. These are called "secure" sites. Because Internet Explorer supports the security protocols used by secure sites, you can send information to a secure site with safety and confidence. (When you are viewing a page from a secure site, Internet Explorer displays a "lock" icon in the status bar.)
Related Topic
Setting security alerts
Return to top |
Don't Check Code | The lowest form of verfication. Neither byte code on your local drive nor on the network is inspected. |
Check Remote Code | Only applets coming from the network are inspected. Any byte code that may have been previously installed on your local drive will not be verified. |
Check All Code | The highest form of verification. Byte code coming from both your local drive and the network are inspected. |
No Network Access | High-level security. Once downloaded, the applet cannot access any servers on the Internet. |
Applet Host Access | Medium-level security: Once downloaded, the applet can only send and receive information from the server from which it was downloaded. |
Unrestricted Access | Low-level security. Java applets can send and receive information to any server on the Internet. |
Tip
Related Topics
New Features: Java
Viewing Java messages
Return to top |
Return to top |