configuring and troubleshooting windows xp professional phần 6

Q: Làm thế nào để hiển thị thời gian hệ thống trên thanh tác vụ của tôi? A: Kích chuột phải vào thanh tác vụ, chọn Properties, và chọn Hiển thị đồng hồ hệ thống. Q: Làm thế nàoChương 3 • Khám phá giao diện Windows XP người sử dụng | 376 Chapter 7 Configuring Internet Technologies apply a change the security level for that zone is labeled Custom and the slider disappears. Figure Setting Custom Security Properties You can also further customize the settings for Java Microsoft Virtual Machine was an integral part of previous versions ofWindows and Internet Explorer. In Windows XP and Internet Explorer 6 it is no longer installed by default however you can download it as required. Under the Microsoft VM subcategory click Custom under Java brings up a button for customizing these permissions at a more granular level. Designing Planning. A Secure Internet Client Environment Most Internet users think only about securing the browser when they contemplate Internet security. In fact you should secure everything that is used to access the Internet. The browser operating system network connection and mail client even the office productivity suite all contribute to a secure environment from where you can start to work securely with the Web. The first task is to apply all service packs and updates. Windows Update is a great place to start for downloading and installing updates for the browser and the operating system. Also Microsoft s TechNet site that concentrates on security issues technet security has security white papers bulletins and hotfixes available for Continued Configuring Internet Technologies Chapter 7 377 download often before they are packaged and made available through Windows Update. Updates for all other software should be available from the vendors Web sites. The second important step to take is to install and maintain up-to-date antivirus software. There is little point in having antivirus software if it has not been updated since 1998. Barely a week passes between virulent outbreaks of new e-mail-based worms and other viruses. Antivirus vendors typically update their files frequently in response to new virus .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.