Using Security Features

Security on the Internet
Controlling JavaTM access
Setting security alerts


Security on the Internet: Overview

The Internet works by sending information from computer to computer until the information reaches its destination. So, when data is sent from point A to point B, every computer in between has an opportunity to look at what's being sent. This can pose a security problem.

For example, suppose you are looking at a clothing catalog on the World Wide Web, and you decide to buy a shirt. This requires that you type certain facts into an order form, including your credit card number. You know the clothing company in question is reputable, so you type your credit card and other information, and then send the completed form. Your information passes from computer to computer on its way to the clothing company. Unfortunately, one of the computers in between has been infiltrated by criminals who watch the data passing through that computer until they see something interesting—such as your credit card number.

How often does something like this happen? It's hard to say, but the important thing is, it's technically possible. And, as the Internet grows, it's bound to happen more and more.

How does Microsoft Internet Explorer help to protect you and your data? Many Internet sites are equipped to prevent unauthorized individuals from seeing the data sent to or from those sites. These are called "secure" sites. Because Internet Explorer supports the security protocols used by secure sites, you can send information to a secure site with safety and confidence. (When you are viewing a page from a secure site, Internet Explorer displays a "lock" icon in the status bar.)

Related Topic
Setting security alerts

Return to top

To control Java access

  1. On the Edit menu, choose Preferences.
  2. Click the Web Content tab.
  3. Select the Java check box.
  4. Choose one of the following from the Byte Code Verification drop-down menu.
    Don't Check Code The lowest form of verfication. Neither byte code on your local drive nor on the network is inspected.
    Check Remote Code Only applets coming from the network are inspected. Any byte code that may have been previously installed on your local drive will not be verified.
    Check All Code The highest form of verification. Byte code coming from both your local drive and the network are inspected.

  5. Choose one of the following from the Network Access drop-down menu.
    No Network Access High-level security. Once downloaded, the applet cannot access any servers on the Internet.
    Applet Host Access Medium-level security: Once downloaded, the applet can only send and receive information from the server from which it was downloaded.
    Unrestricted Access Low-level security. Java applets can send and receive information to any server on the Internet.
  6. Select the Restrict Access to Non-Java Class Files check box to prevent Java applets from reading, creating or modifying files on your local hard drive. When selected, java applets will have access only to files essential to its program.

Tip

Note

Related Topics
New Features: Java
Viewing Java messages

Return to top

To set security alerts

  1. From the Edit menu, choose Preferences.
  2. Click the Security tab.
  3. Make sure the alerts you want to see are checked.
Tips

Return to top