configuring and troubleshooting internet access chapter 9 powered by dj
TRANSCRIPT
Configuring and
Troubleshooting Internet
AccessChapter 9
powered by dj
Chapter Objectives
Configure Internet Explorer 7 Use Pop-up Blocker Work with IE7 Security and Privacy
Options Explain Remote Assistance Explain Remote Desktop Configure Windows Mail Work with Windows Calendar and
Contactspowered by dj
Recall
The various security threats are Virus, Worm and Spyware
Spyware is software that is installed on the user’s computer without the user’s consent. It runs on the background and performs undesirable tasks
A firewall protects the system from the outside threats by blocking the unauthorized traffic while allowing the authenticated ones to enter
powered by dj
Configuring Internet Explorer 7 Internet Explorer 7 is the new version of the Internet Explorer web browser
Some of the components are :
Quick Tabs
Address bar
Tabs and New Tab
Instant search box
Command bar
Zoom
Favorites Center
Status Bar
powered by dj
Practical Activity: Demonstrate a procedure to subscribe to a RSS Feed. (10 min)
powered by dj
Configuring News Feeds
News feeds also known as RSS, web, XML feeds
RSS mainly used for news and blog websites
Identify the RSS feeds on the currently opened website by viewing the orange color button in the command bar
After subscribing, you can get the regenerated items on the website in your RSS feed after a fix interval of time
powered by dj
Configuring the Search Bar and Adding Search Providers Many search providers for IE7:
AOL search Ask Jeeves Yahoo search Microsoft live search
Use of instant search box
Use of address bar powered by dj
Practical Activity: Demonstrate the procedure to add search providers to a search bar.(5 min)
powered by dj
Pop-up Blocker
Pop-up is any Web page that opens in its own separate browser window
When any new window opens automatically, it interrupts while reading the content
Pop up blocker arise with the message ‘Pop-up blocked’ on the information bar when it identifies the incoming advertising window
By default the Pop up blocker is turned on
powered by dj
Practical Activity: Demonstrate a procedure to turn off a pop-up blocker. (2 min)
powered by dj
Working with Custom Filter Levels Pop-up blocker provides three levels for filtering
pop-ups: Low – Allows to open all the windows for a
websites except those who take place automatically
Medium – Blocks most automatic pop-ups, but not pop-ups that open when you click a link
High – Suppress all the new windows including those windows that are opened by clicking on the link
Change the filter level as per your requirement powered by dj
Allowing Pop-ups from Certain Sites
IE7 also allows for adding pop-ups because some websites might not work properly if they are not allowed for generating the pop-up
By blocking the website, pop-up blocker prevents to appear the window
powered by dj
Practical Activity: Demonstrate a procedure to change the filter level. Demonstrate a procedure to allow pop-up blocker from a specific site. Ask the students to block a pop-up from a site. (15 min)
powered by dj
Configuring Notification Options
When the pop-up blocker prevents the window to appear, informed by : The Information bar appears with the
message In the status bar icon appears A sound is played
Use of Information bar - Information bar appears where the Internet explorer display information about security, blocked pop-up windows and other activities
powered by dj
Question for group discussion – What is pop-up blocker? (2 min)
powered by dj
IE7 Security and Privacy Options
Security is the most important because of increases Internet attackers
Configure security settings to protect your computer
IE7 for Windows Vista provides security features Protected mode browsing Phishing filter Pop-up blocker Security zone
powered by dj
Introducing Website Certificates Web certification provides secure transactions on
the Internet
A padlock icon near the address bar for a secured website
Find an error message, if encounter the certificate expired or invalid problem
The Address bar color changes to: Pink Green Yellow
powered by dj
Question for group discussion – What is Phishing filter? (2 min)
powered by dj
Checking the misleading Websites using Phishing Filter Phishing is a trick, used to hack personal
or financial information through email messages and website by the hacker
Phishing Filter runs in the background while you browse the web
If the visited side is on the list of reported phishing websites, Internet Explorer will display a warning webpage and a notification on the Address bar
powered by dj
Practical Activity: Demonstrate a procedure to turn on the phishing filter. Demonstrate a procedure to disable the Phishing Filter. (10 min)
powered by dj
Using Security Zones
Websites can be assigned to the security zones by specifying the security settings
Security Zone Security Level Allowed for adding sites manually
Internet Medium – high No
Local Internet Medium – low Yes (but detect the site automatically)
Trusted Sites Medium Yes
Restricted Sites High Yes
powered by dj
Practical Activity: Demonstrate a procedure to add a site to a trusted zone. (10 min)
Question for group discussion – What is trusted zone? (2 min)
powered by dj
Managing Cookies
Cookies are small text files that store the user information on the computer
Types of cookies are: Temporary or Session cookies Persistent or saved cookies First-party cookies Third-party cookies
The privacy settings options for the Internet zone: Block All Cookies High Medium High Medium (default) Low Accept All Cookies
powered by dj
Practical Activity: Demonstrate a procedure to block all cookies from a Website. Demonstrate a procedure to do advance privacy settings. (10 min)
powered by dj
Managing Web-based Information
Internet Explorer tracks different things such as : Temporary Internet Files - Stores images,
multimedia files and even full copies of web pages
Cookies – Small text files stores on the computer
History – Internet Explorer records and stores a list of all web sites that have been visited
Form data – It stores that data which you enter into a form on a websites
Passwords – The chosen password will be stored by the browser and make it avail the next time you visit that web page
powered by dj
Practical Activity: Demonstrate a procedure to delete the browsing history. (5 min)
powered by dj
Remote Assistance A technology that allows expert to connect to the
remote computer to support user to troubleshoot the problem arises while working
Provides a direct connection between two computers over the Internet or a local area network
Windows Vista contains the Windows Firewall feature that create the blockage for end-to-end communication in Remote Assistance
To solve this trouble you have to enable the exception in Windows Firewall
powered by dj
Practical Activity: Demonstrate a procedure to enable the exception in Windows Firewall. Demonstrate a procedure to enable the computer for receiving Remote Assistance connections. (15 min)
powered by dj
Activating and Securing Remote Assistance
Windows Vista enables to send the remote assistance invitation
For connecting two computers within a network by Remote assistance, the computer should be enabled for receiving Remote Assistance connections
powered by dj
Practical Activity: Demonstrate a procedure to create and send a Remote Assistance invitation through Help and Support and to create a Remote Assistance invitation.(15 min)
powered by dj
Exploring a Remote Assistance Session Remote Assistance invitation is file contains
an encrypted string
The invitation file can be edited using the text editor such as Microsoft notepad
Windows Vista allows to send the Remote Assistance invitation using Help and Support center
Windows Vista allows to save the invitation message with another file name at different location at your computer
powered by dj
Practical Activity: Demonstrate a procedure to open the Remote Assistance invitation by Help and Support Center. (10 min)
powered by dj
Using an Invitation to Establish a Connection
After receiving the invitation: Open it by double-clicking the
invitation file Enter the password transferred by
the host
Alternatively, you can open it by Windows Help and Support center
powered by dj
Managing the Remote Assistance Session Windows Vista provides the Remote
assistance panel to manage the Remote Assistance session
The Remote assistance panel contains : Disconnect Request Control Stop sharing Pause Settings Chat Send file Help
powered by dj
Troubleshooting Remote Assistance
Verify the network connectivity of both host and expert
Configure the windows firewall settings with its advanced security
powered by dj
Remote Desktop
Similar to the Remote Assistance, but both are used for different purpose
Remote Desktop does not require anyone to be logged on or to approve the session
powered by dj
Configuring Remote Desktop Need administrative privileges. When you try
to enable the desktop, three options available: Don’t allow connections to this computer
Allow connections from computer running any version of remote desktop (less secure)
Allow connections from computer running remote desktop with network level authentication (more secure)
powered by dj
Remote Desktop Users Group
By activating the Remote Desktop connection, you can not able to connect to all the users
Connect that user who has been added to your Administrators local group
For connecting another people, you can add the user account to Remote Desktop Users group
powered by dj
Remote Desktop Connection Application
Windows Vista allows you to create a Desktop connection
Used with Aero Interface
Possible to view a good quality video using Remote Desktop over a LAN connection
powered by dj
Practical Activity: Demonstrate a procedure to enable the Remote Desktop on Windows Vista. Demonstrate a procedure to add a user account to the Remote Desktop Users group. Demonstrate a procedure to open the Remote Desktop connection application. (20 min)
powered by dj
Troubleshooting Remote Desktop Check that the user you are trying to connect
should be a member of the Remote Desktop Users Groups
Verify that the firewall in computer must not be configured to allow Remote Desktop connections
The problem may occur due to the advanced security in Windows firewall
Extra firewall between both the computer’s might be blocking your connection
powered by dj
Windows Mail
Windows Vista uses the new Windows Mail feature as the default e-mail client as well as newsgroup reader
Differences between Windows Mail and Outlook Express are : File format Contact information Search Box Junk E-mail filter
powered by dj
Configuring and Using Windows Mail Mails can be viewed by
defining views Contains a search tool Allows to join various
newsgroups, called communities
For the first time, the Internet Connection wizard opens to set up a mail account
Various settings can configured like rules, views, junk e-mail filter
Types of searchmode
Simplesearch
Advancedsearch
powered by dj
Practical Activity: Demonstrate a procedure to create a mail account. Demonstrate a procedure to create mail, attached a file and send an e-mail.(30 min)
powered by dj
Troubleshooting Windows Mail
Unable to send messages Unable to receive messages Unsure whether your Windows Mail is
working properly Error message that says incoming or
outgoing servers are not available Mail box is full Message moved to Junk E-mail folder
powered by dj
Practical Activity: Demonstrate a procedure to search an e-mail. (6 min)
powered by dj
Windows Calendar and Contacts
Windows Calendar is a scheduling application
It supports iCalender
Windows Vista allows you to create a new appointment in Windows Calendar
powered by dj
Creating New Contacts
Provides the flexibility to add a contact with minimal information like the name or nickname
Various other details like phone, address, website, work details, birthday, anniversary, family members and notes can be added
A contact can be created manually using the New Contact button
powered by dj
Practical Activity: Demonstrate a procedure to create a new appointment. (10 min)
powered by dj
Creating a Distribution List
Windows Contacts allows you to put together a set of contacts to form a contact group called distribution list
Advantage - Do not have to manually select all the contacts one by one
powered by dj
Practical Activity: Demonstrate a procedure to create a new contact. Demonstrate a procedure to create a distribution list (Contact Group). (15 min)
powered by dj
Summary I
Internet Explorer web browser provides the new version 7 (IE7). With IE7, the daily tasks such as searching, tabbed browsing, printing, viewing, discovering and subscribing RSS feeds becomes easier
By default, IE7 hides the toolbar. You can view the toolbar by pressing Alt key from the keyboard
IE7 provides the way to add a search provider to the search bar
IE7 provides the pop-up blocker features to prevent the interruption of automatically opened advertisement window. It provides you to apply the pop-up to the security zone
Pop-up blocker provides three levels for alertness Low, Medium and High
powered by dj
Summary II IE7 provides the phishing filter feature. This
feature makes difference between the original and phishing site that prevents the attackers from stealing your personal detail
IE7 provides four security zones namely internet, local intranet, trusted sites and restricted sites
Cookies are small files that store the user information on the computer. Cookies are not usually harmful
A Remote Assistance invitation is an XML file that is automatically created by mail delivery software. The invitation file can be edited using the text editor such as Microsoft notepad. The invitation is saved by Invitation.msrcincident default namepowered by dj
Summary III
The Remote assistance panel contains the controls such as Disconnect, Request Control, Stop sharing, Pause, Settings, Chat, Send file and Help
If the Remote Assistance session is not working properly, first you should verify the network connectivity of both host and expert. If the network connectivity exists, but still the Remote Assistance session is not working, you should configure the windows firewall settings with its advanced security
Remote Desktop connection provides different tabs such as General, Display, Local Resources, Programs, Experience and Advanced that are used for different functioningpowered by dj