Chapter 12

  • You can use the steps in the “Selecting Cookies Settings” section of this chapter.
  • You can use the steps in the “Deleting Browser History” section of this chapter to delete temporary data and then use the steps in the “Selecting Cookies Settings” section to see that the cookies have been deleted.
  • You can use the steps in the “Using InPrivate Filtering and InPrivate Browsing” section. You’ll see that the browsing experience isn’t really any different even though user data isn’t retained on the system.
  • You can use the procedure described in the “Comparing Security Zones” section. By default, ActiveX controls are blocked for the restricted sites zone.

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.