Menu
Is free
registration
home  /  Installation and configuration/ Where to find the Internet Explorer settings. Configuring Internet Explorer to work on the ETP

Where to find Internet Explorer settings. Configuring Internet Explorer to work on the ETP

Choose a section Configured to work on electronic trading platforms.

Possible mistakes

If, when working on the ETP, one of the windows with an error appears:

"Error! The CAPICOM library could not be loaded, possibly due to low permissions on this local machine. "

"CAPICOM object not installed"

“On your computer, there are no or incorrectly configured tools for working with EDS. Please contact the supplier of your certificate and SKZI. "

"The object cannot be created by the object programming server."

"Your browser does not have permission to use ActiveX objects."

then you need to follow the steps described below.

How to customize Internet Explorer

1. Make sure you are using Internet Explorer. If your version of Internet Explorer is lower than 10, then you need to run the 32-bit version (to do this, open the C: \ Program Files (x86) \ Internet Explorer folder and run the iexplore.exe file).

If you have a Windows 10 operating system, make sure you're not opening Microsoft Edge, which has a very similar icon to Internet Explorer.

2. It is necessary to add ETP addresses to Trusted sites.

  • In Internet Explorer "Service" - "Internet Options" ("Internet Options"); go to the "Security" tab;
  • select "Trusted sites" ("Trusted sites"); press the button "Sites" ("Sites");
  • uncheck the box below “For all nodes in this zone, server verification (https :)” is required (not all ETPs work via a secure https: // connection);
  • enter the ETP address (via http and https) into the line “Add the next node to the zone”;
  • insert the site url, after the double slash // put *. and the site address. The entered address should take the form "http: //*.kontur.ru/";
  • click the "Add" and "OK" buttons.

3. For the "Trusted sites" zone, enable the use of Active-X controls.

  • in Internet Explorer "Service" - "Internet Options"; go to the "Security" tab; highlight "Trusted sites"; press the button "Other ...";
  • in the "Active-X elements and plug-ins" section, check "Enable" for all parameters.

4. Download and install CAPICOM-KB931906-v2102.

5. In IE 9 and above, errors may occur that can be resolved using the compatibility mode (Go to Browser Properties - Tools / Compatibility View Mode Options / Add Site Address).

Note: these are general settings for all ETPs. On some sites, it is necessary to install additional components (for example, the CRiptoPro EP browser Plug-in) required for the site to work correctly.

Instructions

If you use Internet Explorer 6 or 7, proceed as follows: first, go to the menu on the chain Tools -> Internet Options -> Connection. In case you are using Dial-up, select the required one, then click "Settings". Otherwise, click on the "Network Settings" button, which is located in the "Local Area Network Settings" section.

Now you need to check the box next to the "Use a proxy server" option, in the "Address" field enter the name of the proxy server you have chosen and in the port field, respectively - the proxy port number. If necessary, check the box next to the option "Do not use a proxy server for local addresses", and also click on the "Advanced" button, and then specify the parameters for various protocols. At the end of the settings, click on the "Ok" button two times: the first time to close the Dial-up or local network settings window, and the second time - the Internet settings window. Ready.

If you prefer to work in the Opera 9 browser, go through the menu chain Tools -> Options -> Advanced. Now go to the "Network" tab located in the section on the left. Click on the "Proxy Servers" button, then select the appropriate proxy servers for the protocols. At the end of the settings, enable the use of a proxy by checking the appropriate boxes: HTTPS, HTTP, and so on.

Web browser Google Chrome appeared on the IT market not so long ago, but it has already won the trust of a number of users. It works according to the "Install and use" principle, but before starting work it is better to make a few changes to the program settings.

And other malicious programs, a properly configured browser with the installation of the necessary add-ons and plugins. One of the best protection against all kinds of spyware is the latest version of the browser installed, such as Internet Explorer 11.

To protect the IE browser, it is advisable to disable unnecessary (or not used) browser settings, possibly vulnerable to external attacks. For advanced security settings, follow these steps:

Turn on pop-up blocking on websites you don't know. This security function allows you to select the desired blocking level. When you visit websites, you will receive pop-up blocking messages. You can also create a list of sites in advance where pop-up windows will not be blocked.


The sites on your list will display pop-ups as usual. To enable pop-up blocking, click on the "Tools" button, and select "Browser options". Next, the "Privacy" tab, the "Pop-up blocking" section, where check the "Enable pop-up blocking" box and agree to the changes with the OK button.


Please note that this feature will not block pop-ups from websites within your local intranet or your trusted sites.

To block absolutely all pop-ups, move the security level slider up. In addition to the default "Medium" mode, there are three more higher degrees of protection.

Protected mode.

Another browser protection setting is Protected Mode. This feature will help prevent malware from running in your browser. To enable Protected Mode, again click the "Tools" icon, "Internet Options". On the Security tab, select the Enable Protected Mode check box and click OK.


Protected Mode is configured separately for all zones: Internet, Local Intranet, Trusted Sites, and Dangerous Sites.

Disable ActiveX.

Internet Explorer's security has been dramatically improved by disabling ActiveX, Active Scripting, and Java. But, in this case, verified sites that also use these functions will not be able to load properly. Add them to your trusted list. To set Internet Explorer to the highest security level, move the slider all the way up and accept the changes with the OK button.

How to enable ActiveX for verified sites.

Click the "Tools" button, go to the "Security" option and check the box "ActiveX Filtering". Now, when you visit a web page with ActiveX controls, Internet Explorer will block them. The ActiveX filtering icon is displayed in the browser address bar. Clicking on the icon will enable the ActiveX for that particular web page.

Disable Java scripting.

Java scripting creates interactive web pages, but is also an open gateway for malware. Only include Java scripts for trusted websites. To disable them - the "Security" tab. Click the Custom button and scroll down to the Run Scripts ... Java heading.

The main purpose of a browser is to view Web pages. Even a small program that takes only a few tens of kilobytes can cope with this task. The first browsers were like that. However, during the fierce competition that erupted between the leading programs Netscape Navigator and Microsoft Internet Explorer, both programs have acquired a lot of additional customizable features. In particular, Internet Explorer, emerging from the battle as a winner, has turned into a huge software package that allows you to customize the program to the individual requirements of the most biased user. In this article, we will cover most of the settings that are present in the sixth version of Internet Explorer. These settings allow you to change the program interface, add the necessary panels and buttons, change the display parameters of the requested pages. This article discusses how to customize various view modes, including disabling graphics, changing the font size, changing the color and encoding of the text of the pages being viewed. From this article, you will also learn how to configure the required privacy and security mode, how to operate with certificates, how to select the size of the folder for storing temporary Internet files, determine the connection to a particular proxy server, and much more.

Toolbar customization

First of all, let's turn to the point View the control menu, which provides access to the most frequently used settings.

On the menu View you can add and remove panels as you wish (fig. 1).

To add or remove buttons on standard toolbars, change their size and arrangement, run the command Toolbars à Setting, as a result, a panel will appear (Fig. 2), where you can change the icons.

On the menu View you can also customize the various browser panes: Search, Favorites, etc. (fig. 3).

Typically, the developers of a Web site determine the size and style of the fonts on the page. However, these parameters may not be optimal for you. You can set your own text display mode in the browser settings. For this in the menu View point the mouse cursor to Font size and select the required size (fig. 4).

You've probably come across a situation when, instead of the text of the page, the browser displays a set of unreadable sequence of characters. In this case, you should check if your browser has selected the correct encoding for this page. Cyrillic (KOI8-R) and Cyrillic (Windows) encodings are often confused.

Most Web pages contain information from which the browser can set the required language encoding.

If there is no such information on the web page, and Internet Explorer is configured with the automatic selection function, then the encoding will be selected automatically.

In order to enable the function of automatic selection of encoding, it is necessary in the menu View Internet Explorer (Fig. 5), check the box in paragraph Auto select.

If using autoselection it was not possible to determine the correct language encoding, but you know which encoding is needed in a particular case, you can select it manually using the command Additionally.

General Tab

in the tab General(Figure 6) you can define the so-called "Home page", that is, the page from which you will start browsing Web resources.

Temporary Internet Files

As you know, to speed up viewing of pages that you have already visited, they are cached on your computer's hard drive and stored for a certain time in the Temporary Internet Files folder. This storage arrangement speeds up the display of frequently visited Web pages because the browser can open them from your hard drive rather than requesting them again from the Internet.

In order to evaluate what resources are available directly from your computer, open the folder Favorites, run the command File à Work offline and pay attention to your panel Favorites. Site names that are not available offline will turn gray, and those that are cached on the hard drive will be highlighted in black (Figure 7).

Obviously, the more space you provide on your computer for cached pages, the more likely it is that the newly requested information will be saved on your disk. In order to increase the Internet cache, go to the tab General to section Temporary Internet Files and select the item Options, as a result of which the panel of the same name will appear (Fig. 8), in which you can configure the value of the maximum allowable folder size for storing temporary Internet files.

Increasing the space reserved for the folder storing temporary files may increase the likelihood of previously viewed Web pages being cached on your computer, but it will obviously decrease the amount of free disk space.

In the next screen of the wizard (Fig. 10), you can set the mode in which the subscription will also occur to those pages to which the base pages will link. Moreover, you can set the depth of the links.

Next, you will be prompted to select a method for synchronizing the page (Fig. 11). There are two options: by the "synchronize" command or by using a new schedule.

If you select the "new schedule" mode, the Wizard prompts you to define the synchronization frequency and specify the synchronization time (for example, every day at 23:00).

Privacy Tab

Internet Explorer keeps your privacy and personal identity secure.

Internet Explorer privacy tools include:

  • security settings that determine how cookies are handled;
  • Privacy Alerts informing you that a Web site you are opening does not match your selected privacy settings.
  • the ability to view the privacy policy of the P3P Web site (Platform for Privacy Preferences Project, P3P.

Due to the support of RZR, servers that collect information about visitors (primarily online stores) and ignore this format may be blocked.

The category of confidential information protected by P3P includes the user's personal data: his real name, e-mail address, etc. Protected information is also information about the web resources visited, recorded in cookies.

To ensure compatibility with the P3P protocol, a web resource must describe its privacy policy, that is, determine what information about users it records, how it stores it, and what cookies it creates. This description is formalized in accordance with the P3P specification and placed in the root directory of the site. Internet Explorer reads this file and gets the information it needs.

The main channels for leakage of confidential information are third sites (they are also called third-party sites), that is, sites to which the user addresses in parallel with the site being viewed. Any Web site that does not appear in a browser window is called a third party. The Web site you are browsing may contain content from third-party Web sites, which in turn may use cookies.

In Internet Explorer 6.0, the default security level is to block cookies from third-party sites that:

  • incompatible with P3P, that is, they did not declare their privacy policy;
  • request personal information without the explicit consent of the user;
  • request personal information without the user's implicit consent.

To change privacy settings, in the tab Confidentiality move the slider up to increase the level of protection and down to set a lower level of protection (fig. 14). The description of the adjustable modes is given in the table.

It should be noted that changing the privacy mode does not affect the cookies already stored on your computer.

By pressing the button Additionally on the panel (Figure 14), you will be taken to a panel where you can define additional privacy settings: disable automatic processing of cookies and define the mode of accepting primary and third-party cookies (Figure 15).

Security tab

Internet Explorer divides the Internet into zones of different security levels, which allows you to assign the required level of protection to each Web site.

Local intranet (Local Zone)

Typically, this zone contains all addresses that do not require a proxy server to access. The default local intranet zone is set to Medium security. Therefore, Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites on which they were created.

Internet Explorer's privacy settings allow you to control how cookies are handled for all Web sites or for each Web site individually.

Reliable nodes

The Trusted Sites zone is set to low security by default. Internet Explorer will allow cookies from Web sites in this zone to be stored on your computer and read by the Web sites on which they were created.

Limited nodes

This zone is set to high security by default. Internet Explorer will block all cookies from Web sites in this zone.

Contents Tab

Access limitation

If you use a computer at home and are afraid that your children may view those pages that you want to restrict access to, you can use the settings located on the tab Content on the panel Internet options(fig. 19).

You can restrict access to thematic groups of sites or set a strict ban on access to specific sites.

It is quite difficult to protect a child from visiting all sites of a certain subject, but if you have information about specific sites to which you want to block access, it is naturally much easier to do this. For example, in the tab Allowed nodes you can specify a list of sites prohibited for viewing (fig. 20).

Authentication problem

Authentication is the foundation of communication security. Users must be able to prove that they are who they say they are, and at the same time must be sure that their correspondents, in turn, do not impersonate someone else. It is more difficult to do this online than in real life, primarily because we, as a rule, cannot personally meet with the partner providing this or that online service. However, even in the case when you see your partner, the problem of identification does not disappear - which is why there are passports, driver's licenses, etc. To authenticate partners on the Web, you must have the appropriate certificates. Before talking about the settings, let's recall the purpose of the certificates.

Certificates

A certificate is a document that identifies the owner or security of a Web site. It is a set of data that allows you to identify a correspondent. Certificates are used to protect personal identity on the Internet and to protect your computer from unsafe software.

An organization with a high trust status can issue certificates that allow a public key to be associated with the identity of its owner. Such an organization is called a Certification Authority (CA), or certification authority.

Internet Explorer uses two types of certificates: personal certificates and Web site certificates.

A personal certificate is used to verify the identity of a user who visits a Web site that requires a certificate. A Web site's certificate validates its identity to clients who request a service from it.

A Web site "identity" certificate is required, for example, when sending confidential information over the Internet to a Web site or downloading software from a Web site.

The basis of authentication is public key encryption. The certificate maps an identifier to a public key. The corresponding private key is known only to the owner of the certificate, who uses it to digitally sign or decrypt the data encrypted with the corresponding public key.

The digital signature specified in the certificate is the user's electronic identification, which informs the recipient that this information really came from a specific correspondent and was not changed at the delivery stage. When a user accesses a secure Web site, the latter will automatically send its certificate to the user. As a result, the user will receive a notification that the connection is secure and the data transmitted by the user will not be available to third parties (Fig. 21), while when requesting more detailed information from the IE browser, it will explain the mode of visiting the protected site (Fig. 22) ...

To be able to send encrypted or digitally signed messages yourself, the user needs to obtain a personal certificate and configure Internet Explorer to work with it.

Checking Web Site Certificate When Downloading Software

There may be several situations when it is important for you to know that the server with which you are going to exchange data belongs to exactly the company to which it ranks itself. Let's take a common example - buying or downloading free software from the Internet.

When you buy boxed software in a regular (non-electronic) store, you receive a sealed box with the product, so you can track whether the packaging is not broken, and in most cases you do not doubt who produced the software product. Another thing is when you download a product from the web. In this case, you do not know whether the supplier of this software is exactly who it claims to be, and the downloaded software does not contain viruses, is complete, reliable, etc.

This problem can be solved by introducing an authentication code (Authenticode) into the redistributable product. This technology enables software developers to digitally sign software developers to include information about the developer in the software they distribute. When users download software that is signed with an authentication code and certified by a CA, they can be sure they are receiving the software from the company that signed it and that the software has not been changed since it was signed.

Such a system is the basis for protecting consumer rights, for example, in case of viruses in the code. Based on code authentication, users can securely receive signed ActiveX controls, signed Java applets, and other applications.

Software developers are also interested in authenticating a Web-based product, as this makes it difficult to counterfeit their software.

Any company wishing to distribute software or content over the Internet needs such a system.

Microsoft client programs, such as Internet Explorer, Exchange, Outlook, Outlook Express, come with security systems that already include an authentication system for code downloaded over the Internet. This is necessary primarily because the above systems are designed for replenishment from the Net. According to the component model, controls such as ActiveX or Java applets can be downloaded to your computer when you browse a Web site. When a user visits a Web page that needs to play an animation or sound, code is often loaded onto the client machine to perform the required function. In this case, the user runs the risk of downloading a virus or other unsafe code. In order to secure the user, a system of signed applications exists.

If a user of the above client applications encounters an unsigned component, the following will happen:

  • if the security system of the application is configured for the "High security" mode - the client application will refuse to download the code;
  • if the security system of the application is configured for the "Medium security" mode, the client application will issue a warning (Fig. 23);
  • if, on the contrary, the user encounters a signed applet, the client program will display another message (Fig. 24).

Having received confirmation of the authenticity of the downloaded software, the user understands that, firstly, the software that he is going to download really belongs to the publisher, and secondly, he knows that authentication was provided by such and such a center, and represents where to get additional information in order authentication. In this session, users can trust the further download procedure. Users can also select the "Always trust download from this publisher" command to speed up the verification process in the future.

Users can always get additional information about the certificate (Fig. 25).

Installing Publisher Certificates

Certificate issuers create for themselves special, so-called root, certificates that confirm the authenticity of their private keys. Each particular type of certificate has its own root certificate: one for e-mail certificates, one for full personal certificates, and one for servers. Usually browsers come with a set of these certificates.

If, when browsing the Internet, you come across a server with a certificate issued by an unknown publisher, you will be prompted to accept this certificate and, if it contains the root certificate of the same publisher, you will be offered the opportunity to install this certificate and assign actions to servers with certificates received from given by the publisher.

Using digital certificates can ensure the security of your online transactions because it allows you to associate the identity of the certificate holder with a pair of keys (public and private).

Obtaining a personal certificate

So far, we've talked about the need for servers to prove their authenticity. However, in some cases, servers require confirmation of the client's identity. Therefore, now we will talk about personal certificates. There are several categories of trustworthiness for certificates issued by independent certification authorities.

Personal certificates are used to verify the identity of a user at the request of some sites that provide a particular service. Certificates are issued by the same certificate issuers, that is, a third party trusted by both the user and the service operator.

To obtain a certificate, you must register with the certificate issuer of your choice.

Usually, to obtain a certificate, you need to provide the issuer of certificates by mail, and sometimes personally certain documents, and then pay for the certificate.

The procedure for obtaining a certificate is as follows: you go to the certificate issuer's Web server, fill in the data required to obtain a specific certificate, and select the length of the private key (preferably at least 1024 bits). Before submitting the form, your browser will generate a public (public) and private (private) key pair and enter them into a password-protected database. The private key is known only to you - it should not be known to anyone else, including the certification authority. On the contrary, the public key is sent along with other entered data to the certification authority for inclusion in the certificate. It is impossible to determine the pair of the public key - the private key.

After issuing a certificate, the certification authority usually sends you a certificate or specifies a URL where you can download it. After downloading the certificate from the certificate issuer, the browser automatically starts the installation procedure.

Installing and Removing Certificates

Internet Explorer has a certificate manager - Internet Explorer Certificate Manager (Figure 26).

It allows you to install and remove client certificates and certificates of certification authorities, or, as they are also called, CA (from the English Center Authority). Many CAs already have root certificates preinstalled in Internet Explorer. You can choose any of these pre-installed certificates for code authentication, time stamped documents, secure mail, etc. In order to install or remove certificates, go to the tab Content... Select item Certificates and then the corresponding tab. The following tabs are available: Personal, Other Users, Intermediate Certification Authorities, Trusted Root Certification Authorities, etc.

Certificates in category Personal have matching private keys. Information signed by means of personal certificates is identified by the user's private key. By default, Internet Explorer places all certificates that identify a user (using a private key) into a category Personal.

In the tab Trusted Root Certification Authorities usually, root certificates are already preinstalled, which you can view and get all information about them: by whom they were issued, their validity period, etc. (fig. 27).

By clicking on one of the certificates, you can get additional information about it, including the composition and the certification path (Fig. 28).

Setting up a proxy server in Internet Explorer

As you know, modern browsers such as Internet Explorer and Netscape Navigator have internal cache settings that allow you to determine the amount of disk space on your machine that will be used to cache documents you have already viewed. The browser periodically refreshes the documents in the cache to keep them fresh. However, the amount of cache on a PC is usually small, because PC users rarely allocate more than a gigabyte of disk space for caching, so the amount of stored documents is small. It is difficult to allocate a large amount of memory on a local computer, but this can be done on the provider's proxy server - a computer running a special program that caches data requested by all clients of a given provider. Large providers can allocate tens or even hundreds of gigabytes to their customers. Some users fear, however, that using cached documents from a proxy server, they will receive outdated documents, but there is technology to avoid this.

There are a number of criteria by which a decision on caching on a proxy server is made. For example, if an object is marked as confidential, then it will not be cached. Similarly, there are criteria by which a decision is made about the possibility of sending a cached document to a client's request. For example, if a document has passed the expiration date, the server will not send it to the client, but will request a fresh document. Thus, fresh documents (not expired) are provided immediately, and if the proxy server doubts that the document is fresh, it can ask the Web server if the document has changed. It is possible that an expired document is not actually out of date because it has not been updated, in which case the Web server will respond to the proxy server that the document has not yet been "corrupted" and can be submitted to a client request. In other words, there is every reason to use a proxy server.

To set up a connection through a proxy server, go to the tab Connections on the panel Internet options(fig. 32) and instead of paragraph Never use(which you probably had configured if you weren't working through a proxy) select Always use the default connection.

Then refer to item Customization, which will lead to the appearance of the panel shown in Fig. 32.

Check the box Use a proxy server for this connection and enter the proxy server address and port - these addresses should be obtained from your ISP. I use the services of Zenon and in my case it is proxy.aha.ru. Then go to the item Additionally(fig. 33) and indicate One proxy server for all protocols.

It should be noted that work through a proxy server is not always optimal. The most obvious example is if you have faster access to some Web server than to a proxy server, then there is no point in accessing a proxy server. Or, for example, if you are debugging Java applets on some server and you need to constantly watch how your software is working correctly, then, of course, you will not be satisfied with loading the previous version of the applet. The panel shown in Fig. 33 Additionally, Play video, as a result, pages will load faster.

After you have removed the display of pictures and loaded the page, it will be displayed in a "trimmed" form, as shown in fig. 37. There will be icons instead of pictures. By right-clicking on such an icon, you can bring up the context menu and view the required picture.

ComputerPress 11 "2002

If your browser is slow, it isn't necessarily a bad internet connection. Third-party toolbars, some add-ons, cookies, or suboptimal settings can also hinder browser performance.

Here are some simple steps you can take to optimize your Internet Explorer browser:

More ideas that might be helpful:

Removing toolbars

Many toolbars that are downloaded and embedded in a browser affect not only its appearance, but also slow down the movement of Internet traffic.

The browser toolbar is an add-on (extension) added to its interface. While some browser add-ons can enhance your online experience and can be very useful, others have negative consequences. They can easily set themselves to "default" status when bundled with widely available free applications, and they sometimes interfere with or conflict with other software on the computer.

Each toolbar carries its own specialized functionality, such as search, emoji, music player, and so on, so they will require additional resources to run.

In order to remove some of the toolbars, you will need to open the list of installed programs (in Windows 7, click Start(Start)> Control Panel(Control Panel) and under Programs(Programs) click Removing a program(“Uninstall a program” - uninstall programs that you never use).

Right-click each toolbar in the list that you would like to remove and select Delete(Uninstall). After you complete this process, the toolbars will be completely removed.

Disable toolbars and add-ons right in the browser

2. Click the button Service(in the form of a gear) in the upper right part of the window, then select Configure add-ins(Manage add-ons).

3. Under the inscription Display(Show) select All add-ons(“All add-ons”).

4. Select each add-on you want to disable and click Disable(Disable).

5. When you're done, close the window and restart your browser.

Clearing cookies and clearing browser cache

Few people forget to do this, and in the end, the hard drive becomes overflowing with a large amount of data stored by the browser for years.

To clear your browser cache:

1. Open Internet Explorer.

2. Click the button Service(Tools), hover over the item Security(Safety) and select Delete browser history(Delete browsing history). If you do not want to delete the cookies and files of the websites in the favorites list, select the checkbox Save data of selected websites(Preserve Favorites website data).

3. Check the boxes next to the types of data that you want to delete.

4. Click Delete(Delete).

Reset browser settings

Sometimes, when you install a program, it can change your browser settings without your knowledge. You may notice that your browser is behaving in a strange way.

If Internet Explorer stops responding to commands or works in general, if you encounter error messages saying that Internet Explorer will close, or if you experience a noticeable slowdown, you might want to reset your Internet Explorer settings. To do this, follow the steps below.

1. Start Internet Explorer.

2. Click the button Service(Tools), then select Browser properties(Internet Options).

3. In the window Browser properties(Internet Options) click the tab Additionally(Advanced).

4. Click Reset(Reset).

5. In dialogue ResetparameterssettingsInternet Explorer click Reset
Check the box Delete personal settings(Delete personal settings) only if you want to delete the browsing history, search service settings, Accelerators, home pages, Tracking protection and ActiveX Filtering data along the way. By checking this box, you are essentially launching a fresh version of Internet Explorer.

6. When Internet Explorer finishes switching to default settings, click Close(Close), and then OK.

7. Close Internet Explorer and restart it.

Installing a new version of Internet Explorer

Upgrading to the latest version of Internet Explorer will make Internet access faster. In addition, your computer will be safer and it is very likely that the problems you have with your old browser will go away.

Using the following table, you can find out what the latest version of Internet Explorer you can use in relation to the operating system you are using:

To get the latest version of Internet Explorer, follow this link.

Switching to another browser

There are many internet browsers out there, each slightly different from the others. Some browsers have a lot of functions, others are quite simple in this sense. Some perform slightly better than others. But all internet browsers basically do the same thing: they allow us to browse websites.

The most popular browsers are Google Chrome, Mozilla Firefox, Internet Explorer, Safari and Opera. There are also other less popular browsers like RockMelt, Avant Browser, Maxthon, Deepnet Explorer, Flock, SeaMonkey, AOL Explorer, etc.

Switching from one browser to another is in most cases the fastest and easiest way to fix many of the problems we face. If your browser is cluttered with toolbars and plugins, doesn't open some websites, or takes too long to load content, you can try installing a different one and see if it works better.

To install a new internet browser, you will need to use the one you already have in order to find and download a different one. Just use a search engine like Google or Bing to find the browser you want to install and click on the download link.

Here are the pages on our site for the most popular browsers that you can use instead of Internet Explorer:

You may also find a guide on how to optimize your internet speed and performance when using Chrome and Firefox for help.

Based on materials from the Internet portal. Translation into Russian: Alexander Ryabov