IT tutorials
 
Technology
 

Windows 8 : Managing Internet Explorer add-ons (part 1) - Managing ActiveX controls - Controlling ActiveX opt-in

6/29/2014 4:37:53 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. Understanding add-ons

Internet Explorer supports add-ons that provide a wide array of services. For example:

  • You can run an add-on that provides audio and video support for a unique protocol.

  • Businesses can use ActiveX-based add-ons to extend the capability of their web applications.

  • Users might unwittingly run an ActiveX add-on that installs malware on their PC.

Add-ons can be useful, but they can also create challenges. In Internet Explorer 10, your ability to use add-ons depends on which variation of Internet Explorer 10 you’re using. One of the critical differences between the two variations of Internet Explorer 10 in Windows 8 is in how each supports add-ons. Add-ons have two important drawbacks:

  • They are not touch-friendly.

  • They have been one of the most common vectors by which attackers have managed to infect Windows systems with malware.

Therefore, the use of add-ons is not supported in the touch-optimized variation of Internet Explorer 10, although the desktop variation continues to provide full support. Because the touch-optimized UI in Internet Explorer 10 doesn’t support add-ons, you might have a very different browsing experience as you move between the two variations of the product, and you might not be able to do everything in the touch-optimized UI to which you’ve become accustomed in the desktop UI.

INTERNET EXPLORER AND FLASH-BASED SITES

Don’t be concerned that you or your users might be negatively affected by the Internet Explorer 10 touch-optimized variation’s inability to support the Flash add-on. Most Flash-based sites still work just fine in Internet Explorer 10 because Flash support is built into both versions of the browser, at least to a point. The touch-optimized variation of Internet Explorer 10 can play Flash content only for sites included in Compatibility View. You can also choose to disable Flash. Internet Explorer 10 was designed to stay as close to established web standards—such as HTML5—as possible, and the hope is that an increasing number of sites will make the move toward video-based on HTML5.

2. Managing ActiveX controls

For those using the traditional Internet Explorer 10 for the desktop, ActiveX controls remain the most common type of add-on that users will experience. In modern versions of Internet Explorer, the user is protected from malicious ActiveX controls through a combination of administrator-defined parameters and warnings that appear when ActiveX content is about to be executed.

Controlling ActiveX opt-in

The most common interaction that you will have with ActiveX occurs when someone browses to a site on the Internet that requires an ActiveX add-on to be installed to enable some kind of functionality on the page. When this happens, an Active-X installation request like the one shown in Figure 1 appears at the bottom of the browsing window.

Request for user permission to install an ActiveX control

Figure 1. Request for user permission to install an ActiveX control

These kinds of ActiveX controls are not installed automatically. Instead, a user must deliberately click the Install button to proceed with the installation of the identified tool. When the user clicks Install, the Windows 8 User Account Control feature intercepts the installation request and requests permission for the installation to proceed. If the user allows the installation, the installation proceeds, and the ActiveX control is allowed to operate.

In the preceding example, the user was browsing to a site on the Internet, which is why she had to go through the multistep approval process to install the ActiveX control. The outcome is different if the user is browsing to a local site on the intranet or to a site on the Trusted Sites list. If browsing to a site that exists in one of those zones, the user is not prompted for the installation of the ActiveX control because controls in those zones are assumed to be trusted.

You can modify the behavior of Internet Explorer so that it requires permission before executing ActiveX controls. To change the configuration of a zone, complete the following steps:

  1. Open Internet Explorer from the desktop.

  2. In Tools, choose Internet Options and select the Security tab.

  3. Choose the zone you’d like to modify and click the Custom Level button near the bottom of the window.

  4. In the Security Settings window—which is like the windows shown in Figures Figure 2 and Figure 3—scroll down until you locate the ActiveX Controls And Plug-Ins section.

    A list of ActiveX settings for the Internet zone

    Figure 2. A list of ActiveX settings for the Internet zone

    A list of ActiveX settings for the Local Intranet zone

    Figure 3. A list of ActiveX settings for the Local Intranet zone

  5. Under Allow Previous Unused ActiveX Controls To Run Without Prompting, decide how you want to handle these items:

    • Choose Enable to avoid the user having to intervene in the installation process.

    • Choose Disable to require the user to approve the installation of all ActiveX controls from sites in this zone.

  6. Click OK until you’re back at the browsing window.

 
Others
 
- Windows 8 : Managing Internet Explorer - Understanding and configuring browser security settings (part 3) - Adding trusted sites to Internet Explorer
- Windows 8 : Managing Internet Explorer - Understanding and configuring browser security settings (part 2) - Disabling Protected Mode
- Windows 8 : Managing Internet Explorer - Understanding and configuring browser security settings (part 1) - Using Enhanced Protected Mode
- Microsoft Exchange Server 2013 : Mailbox management - Reconnecting mailboxes
- Microsoft Exchange Server 2013 : Mailbox management - Removing or disabling mailboxes
- Microsoft Exchange Server 2013 : Mailbox management - Setting mailbox quotas
- Microsoft Exchange Server 2013 : Mailbox management - Mailbox resources provisioning management agent
- Windows 8 : Configuring Internet Explorer 10 (part 4) - Managing Internet Explorer settings by using Group Policy
- Windows 8 : Configuring Internet Explorer 10 (part 3) - Controlling Internet Explorer Start screen tile behavior, Configuring Internet Explorer 10
- Windows 8 : Configuring Internet Explorer 10 (part 2) - Configuring the startup Internet Explorer
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us