It also explains how to configure Internet Explorer 5 by setting Security and Connections options.. Configure Internet Explorer 5 by setting Security and Connections options!. Configure
Trang 1Contents
Overview 1
Demonstration: Downloading Files
Review 16
Module 2: Using a Web Browser
Trang 2to represent any real individual, company, product, or event, unless otherwise noted Complying with all applicable copyright laws is the responsibility of the user No part of this document may
be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Microsoft Corporation If, however, your only means of access is electronic, permission to print one copy is hereby granted
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property
2000 Microsoft Corporation All rights reserved
Microsoft, ActiveX, BackOffice, Internet Explorer 5, MS-DOS, WebTV, Windows, Windows NT, and Windows 2000/98/95 are either registered trademarks or trademarks of Microsoft Corporation
in the U.S.A and/or other countries
The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted
Other product and company names mentioned herein may be the trademarks of their respective owners
Program Manager: Steve Merrill
Development Lead: Basabjit Chakrabarty (NIIT)
Instructional Designers: Sangeeta Nair, Vijayalakshmi Narayanaswamy (NIIT); Veena Nambier,
Yatinder Walia (NIIT)
Technical Contributors: Scott Swigart (3 Leaf Solutions); Gary Gumbiner (Great Barrier
Technologies, Inc.)
Graphic Artist: Scott Serna (Creative Assets)
Editing Manager: Jennifer Linn
Editor: Reid Bannecker
Production Manager: Miracle Davis
Production Coordinator: Linda Lu Cannon (The Write Stuff)
Build Coordinator: Eric Wagoner
Testing Lead: Eric Meyers
Testing: Bryan Urakawa, Chris and Edward
Lead Product Manager, Internet Services: Hilary Vandal
Manufacturing Manager: Rick Terek
Operations Coordinator: John Williams
Manufacturing Support: Laura King; Kathy Hershey
Lead Product Manager, Release Management: Bo Galford
Group Manager, Courseware Infrastructure: David Bramble
General Manager: Robert Stewart
Trang 3Instructor Notes
This module introduces students to the developer features of Microsoft Internet Explorer 5 It also explains how to configure Internet Explorer 5 by setting Security and Connections options Students will also learn how to download files using File Transfer Protocol (FTP) Finally, this module describes and contrasts the features of the Web browsers currently available
After completing this module, students will be able to:
! Identify the developer features of Internet Explorer 5
! Configure Internet Explorer 5 by setting Security and Connections options
! Download files using FTP
! Identify the contrasting features of available Web browsers
Materials and Preparation
This section provides you with the required materials and preparation tasks to teach this module
Required Materials
To teach this module, you need the following materials:
! Microsoft PowerPoint file 1912A_02.ppt
! Module 2, “Using a Web Browser”
Preparation Tasks
To prepare for this module, you should:
! Read all of the materials for this module
! Complete all the demonstrations in the module
Presentation:
30 Minutes
Lab:
00 Minutes
Trang 4Module Strategy
Use the following strategy to present this module:
! Features for Developers This topic provides an overview of the features that Internet Explorer 5 provides for developers First, explain the dynamic HTML (DHTML) support built-in to Internet Explorer 5 Then, explain the XML support
! Configuring Internet Explorer 5 This section explains how to configure Internet Explorer 5 First, explain the Security options Then, explain the Connections options Finally, explain how to set Security and Connections options
! Downloading Files Using FTP
In this topic, students will learn how to download files using FTP
! Comparing Available Web Browsers
In this topic, students will learn about the technologies that available Web browsers support
Trang 5# Overview
! Features for Developers
! Configuring Internet Explorer 5
! Downloading Files Using FTP
! Demonstration: Downloading Files Using FTP
! Comparing Available Web Browsers
! Review
Microsoft® Internet Explorer 5 provides a rich platform for building Web-based applications
Internet Explorer 5 is the ideal platform for developers building applications for the Web because Internet Explorer 5:
! Delivers a fast, stable, and rich development environment for creating applications that employ dynamic HTML (DHTML)
! Provides improved support for key standards, including Extensible Markup Language (XML)
! Makes the power of DHTML available for everyone through a new feature called DHTML behaviors
After completing this module, you will be able to:
! Identify the developer features built into Internet Explorer 5
! Configure Internet Explorer 5 by setting the Security and Connections options
! Download files using FTP
! Identify the contrasting features of available Web browsers
Slide Objective
To provide an overview of
the module topics and
objectives
Lead-in
Microsoft Internet Explorer 5
provides a rich platform for
building Web-based
applications
Trang 6Features for Developers
! Dynamic HTML (DHTML) support
$ Provides interactivity in Web pages
! DHTML behaviors
$ Store Web page information and style
! XML support
$ Enables developers to build Web-based applications
$ Allows you to separate data from presentation
Dynamic HTML (DHTML) allows you to transform a static Web page into something that behaves more like a complete application You can use DHTML
to create rich, interactive pages that require less bandwidth to be displayed in a browser window Internet Explorer 5 provides the benefits of encapsulation and code reusability to DHTML users DHTML behaviors, user data persistence, and data transfer enable interaction of client Web pages without the client having to make numerous requests to the Web server
For more information about DHTML, and to see some example DHTML scripts, go to http://www.dynamicdrive.com/
Dynamic HTML behaviors
Internet Explorer 5 supports DHTML behaviors DHTML behaviors allow you
to store Web page style information
Behaviors are components that separate the HTML code from the script Behaviors store the script in a separate file and allow code reusability
XML support
Internet Explorer 5 is the first commercially available browser that supports XML version 1.0 XML support allows developers to focus on building Web-based applications Internet Explorer 5 also supports other XML-Web-based technologies, such as Extensible Stylesheet Language (XSL) and XML Document Object Model (DOM) XML allows you to separate data from display so that the data retains its semantic meaning XML also allows a given document to be rendered in many different ways through XSL style sheets For more information about XML, go to http://www.xml.com/pub
Slide Objective
To provide an overview of
dynamic HTML and XML
Lead-in
Internet Explorer 5 supports
dynamic HTML and XML
Note
Trang 7# Configuring Internet Explorer 5
! Exploring Security Options
! Setting Security Options
! Setting Connections Options
! Demonstration: Setting a Proxy Server
Internet Explorer 5 offers a variety of options to control its appearance and operation Let’s look at how to configure two of the key options: Security and Connections
The need for security is an unfortunate side effect of connecting to the Internet and browsing Web pages To help protect you from dangers such as computer viruses, Internet Explorer 5 supports security zones, which allow you to set different levels of security depending on the site that you browse For example, you can configure Internet Explorer 5 to trust a Microsoft ActiveX® object that
is on your company intranet, but restrict the use of ActiveX controls from the Internet
You must set the Connections options before you can access the Internet These options allow you to specify additional information that may be needed to communicate on the Internet For example, if your company uses a proxy server
to connect to the Internet, you may need to configure Internet Explorer 5 so that
it can route page requests through the proxy server
In this section, you will look at how to set the Security and Connections options
in order to configure Internet Explorer
Slide Objective
To provide an overview of
the topics in this section
Lead-in
Internet Explorer 5 offers a
variety of options that
control its appearance and
operations Let’s look at how
to configure two of the key
options: Security and
Connections
Trang 8Exploring Security Options
! Web Content Zones
$ Internet zone
$ Local intranet zone
$ Trusted sites zone
$ Restricted sites zone
! Security Levels
$ Medium
$ Medium-low
4
Internet Explorer 5 defines security zones for the information that you access on the Internet This allows you to set a different level of security for each zone Determining the level to set depends on where the information comes from and how much trust you have in the source When you attempt to open or download content from the Web, Internet Explorer 5 checks the security settings for the zone of that particular Web site
For example, some pages that you request will contain ActiveX controls An ActiveX control works much like a stand-alone application and has complete access to all the files and registry settings on your computer If a page contains
an ActiveX control, Internet Explorer 5 will download this control, inspect it, and compare the results to the security settings that you have defined For an intranet, you may specify that controls should simply be installed and executed For the Internet, you will probably want to be notified that an ActiveX control has been downloaded, and be given the option of canceling the installation
For an intranet, you typically set the security level to medium-low or low; for the Internet, you set the security level to medium
Slide Objective
To introduce the various
options in the Security tab of
the Internet Options dialog
box
Lead-in
Security is an essential
feature when you have
access to the Internet
Note
Trang 9Setting Security Options
Let’s look at how to set the security levels for the various security zones in Internet Explorer 5
! Set the Security options
1 Open Internet Explorer
2 On the Tools menu, click Internet Options
3 The Internet Options dialog box appears On the Security tab, select a zone from the Select a Web content zone to specify its security settings
section
Slide Objective
To explain how to set the
Security options
Lead-in
Let’s now look at how to set
the Security options
Delivery Tip
Explain the steps for setting
the Security options
Trang 10You can set the security level for each zone listed in the Select a Web content zone to specify its security settings section The setting determines how Internet Explorer 5 handles the files that you attempt to load
The four security zones are:
• Internet zone The Internet zone contains addresses of sites that are not present on your computer or assigned to other zones The default security level for the Internet zone is medium
• Local intranet zone The Local intranet zone contains addresses that do not require a proxy
server These include the Web sites specified on the Connections tab,
network paths, and local intranet sites You can add sites to this zone The default security level for the Local intranet zone is medium
• Trusted sites zone The Trusted sites zone contains the sites that can be downloaded without damaging your computer or data You can add sites to this zone The default security level for the Trusted sites zone is low
• Restricted sites zone The Restricted sites zone contains addresses of sites that could potentially damage your computer or data You can add sites to this zone The default security level for the Restricted sites zone is high
Delivery Tip
Explain the security zones
by pointing to the options in
the Security tab of the
Internet Options dialog box
Trang 11You can check the zone of your current Web page on the right side of the Internet Explorer status bar
4 Set the level for each of the zones listed in the Select a Web content zone
to specify its security settings section to one of the following options in the Security level for this zone:
• High You are notified of any potential security problems The active content that may pose a security problem is not downloaded
• Medium You are warned of potential security problems and then given a choice
to download or view the active content
• Medium-low Similar to the Medium option, except that most of the content will be run without prompts, and unsigned ActiveX controls will not be downloaded
• Low You are not warned of any potential security problem All the active content with a valid security certificate is downloaded
Tip
Delivery Tip
Explain the security levels
by pointing to the options in
the Security tab of the
Internet Options dialog box
Trang 12Setting Connection Options
! Internet Connection Wizard
! Proxy Server
Before you use Internet Explorer 5 to browse the Internet, you must specify the type of Internet connection that you are using Internet Explorer allows you to connect to the Internet through a local area network (LAN) or a modem
Slide Objective
To describe the sections in
the Connections tab of the
Internet Options dialog box
Lead-in
You need to set specific
connection options before
you can access the Internet
Delivery Tip
Explain the LAN settings
with the help of the screen
shot provided on the slide
Trang 13To connect to the Internet, click the Connections tab on the Internet Options
dialog box
The LAN settings on the Connections tab are grouped under Proxy server and
Automatic configuration
Internet Connection Wizard
To automatically set up a new connection to the Internet, you can use the Internet Connection Wizard
To use the Internet Connection Wizard, click Setup on the Connections tab
You can also manually configure the modem or LAN settings after you use the Internet Connection Wizard to set up a new connection to the Internet
Proxy server
If you access the Internet through a LAN, you need to connect to a proxy server A proxy server acts as a security barrier between your internal network, which is the intranet, and the Internet A proxy server prevents people on the Internet from gaining access to confidential information on your internal network or your computer