Enterprise Software

Best of 2001: Block unauthorized sites and malicious code with Internet Explorer

Of all the steps you can take to help secure your network, one of the simplest is configuring Internet Explorer to block malicious scripts or questionable content. This article, the second most popular in IT Consultant for 2001, shows you how.


While it’s one of the most ubiquitous desktop applications, Internet Explorer (IE) can also present some substantial challenges for consultants who are performing network administrative work for their clients. In 2001, an article by TechRepublic and TechProGuild contributor Brien Posey that discussed security functions in IE came in as the second most popular article in IT Consultant Republic.

The article was the second in a three-part series that explained ways to customize IE’s security settings. The first article explored customizing IE’s security zones to block harmful content from infiltrating your network, and the third article gave users instructions on customizing IE’s desktop security settings.

Top five articles for 2001
All this week, we’re featuring the articles that TechRepublic members visited the most in IT Consultant Republic during 2001.

Our fifth-ranked article directed members to a downloadable sample service level agreement, which was sent our way by a TechRepublic member. Our fourth most popular item was a mini-white paper by TechRepublic columnist Rick Freedman that covered the five fundamentals of IT consulting. The third most popular article featured a contract template sent to us by a TechRepublic member.

Check back tomorrow for number one on our list of the most popular IT Consultant Republic pieces from 2001.

What are the top network security risks that you encounter?
As a consultant, what are some basic security flaws that you commonly see in your clients’ networks? Are they willing to fix them, or do they cross their fingers and count on not falling victim to the flaws? Post your comments below or send us an e-mail.

 

While it’s one of the most ubiquitous desktop applications, Internet Explorer (IE) can also present some substantial challenges for consultants who are performing network administrative work for their clients. In 2001, an article by TechRepublic and TechProGuild contributor Brien Posey that discussed security functions in IE came in as the second most popular article in IT Consultant Republic.

The article was the second in a three-part series that explained ways to customize IE’s security settings. The first article explored customizing IE’s security zones to block harmful content from infiltrating your network, and the third article gave users instructions on customizing IE’s desktop security settings.

Top five articles for 2001
All this week, we’re featuring the articles that TechRepublic members visited the most in IT Consultant Republic during 2001.

Our fifth-ranked article directed members to a downloadable sample service level agreement, which was sent our way by a TechRepublic member. Our fourth most popular item was a mini-white paper by TechRepublic columnist Rick Freedman that covered the five fundamentals of IT consulting. The third most popular article featured a contract template sent to us by a TechRepublic member.

Check back tomorrow for number one on our list of the most popular IT Consultant Republic pieces from 2001.

What are the top network security risks that you encounter?
As a consultant, what are some basic security flaws that you commonly see in your clients’ networks? Are they willing to fix them, or do they cross their fingers and count on not falling victim to the flaws? Post your comments below or send us an e-mail.

 

Editor's Picks

Free Newsletters, In your Inbox