tailieunhanh - sybex mcitp microsoft windows vista desktop support consumer study guide exam 70 623 phần 7
Những gì bạn nên làm gì? A. Đánh dấu các máy tính trong hộp thoại Chia sẻ Truyền thông và kích Allow. B. Mở hộp thoại truyền thông chia sẻ và cho phép tùy chọn Tìm Truyền thông mà những người khác đang chia sẻ. C. Mở hộp thoại truyền thông chia sẻ, | 298 Chapter 5 Configuring Windows Vista Security TABLE High Settings That Are More Restrictive Than the Medium-High Security Level continued Setting Option Allow Webpages to Use Restricted Protocols for Active Content Disable Drag and Drop or Copy and Paste Files Prompt Include Local Directory Path When Uploading Files to a Server Disable Installation of Desktop Items Disable Launching Applications and Unsafe Files Disable Launching Programs and Files in an IFRAME Disable Open Files Based on Content Not File Extension Disable Software Channel Permissions High Safety Submit Non-encrypted Form Data Prompt Userdata Persistence Disable Websites in Less Privileged Web Content Zone Can Navigate into This Zone Disable Active Scripting Disable Allow Programmatic Clipboard Access Disable Scripting of Java Applets Disable Logon Prompt for User Name and Password Now in Exercise you will set up a Custom security level in Internet Explorer. EXERCISE Customizing Internet Explorer s Security Zones 1. Open Internet Explorer from your Windows Vista computer Start Internet Explorer . 2. Select Tools Internet Options. Configuring Internet Explorer 7 299 EXERCISE continued 3. Click the Security tab as shown here. 4. In the Select a Zone to View or Change Security Settings box click Internet and then click the Custom Level button. 5. From here find the section called ActiveX Controls and Plug-ins. Find Allow Scriptlets and click Prompt. Now find Download Unsigned ActiveX Controls and click Prompt. Finally find Initialize and Script ActiveX Controls Not Marked as Safe for Scripting and click Prompt. Then click OK. These settings can be useful if you need to run a custom script that is not yet signed and exists outside of your intranet zone. For example if you have a development team working on some ActiveX controls they may have a need to run ActiveX controls that normally would be deemed suspicious. These customizations allow them to use these controls. Even better you
đang nạp các trang xem trước