answersLogoWhite

0

Web Browser

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What is the Microsoft Internet explorer software program called that allows you to view the contents of the web?

Web Browser


Microsoft internet explorer is a software program called that allows you to view the contents of the world wide web?

Web browser


What is the name of Microsoft Internet Explorer sotware program called that allows you to view contents of the world wide web?

Internet Explorer (IE).


What is a Microsoft program that enables you to view the contents of the World Wide Web?

Internet Explorer.


In what year did Microsoft release Internet Explorer 7?

The seventh version of Microsoft's Internet Explorer was official released on October 18, 2006. The program has since been replaced a number of times.


Is Microsoft internet explorer 2007 the current version?

While it is still functional as a stand alone program, Internet Explorer 9 is the most current version.


Internet explorer and safari are examples of what?

Netscape Navigator was/is a program to surf the Internet. Mozilla made Nescape before they made the program Firefox. Netscape is no longer updated but Firefox is the current replacement program. If you want an alternative Internet browser to Microsoft's Internet Explorer, Firefox is a good choice. Microsoft Explorer is the internal Windows sub program on your computer for organizing files and/or folders. when you click on "My Computer" or "My Documents" you are going into Windows Explorer. Another feature of Explorer is if you know you have a file saved somewhere on your computer, but can't remember where it is. You can search for it by using the search file/folder option of Explorer. Click "Start" then click on the spy glass icon. Windows Explorer is often confused with Internet Explorer, because of the similar name. Both are Microsoft creations which can compound the confusion. Microsoft Internet Explorer, sometimes referred to simply as I.E. is the program Microsoft has embedded into Windows to surf the Internet. If you have Windows installed on your computer, you also have Internet Explorer installed. You may also have other browsers installed, such as Mozilla's Firefox, or Google's Chrome, but Microsoft's browser is called Internet Explorer.


How do you find windows explorer on your Microsoft Windows 95 software?

The program for Windows Explorer, explorer.exe, should be located in C:\Windows\System32.


What program does Windows use as a default to open mdb files amongst Windows Explorer Internet Explorer MS Access and Microsoft Excel?

It uses Microsoft Access to open mdb files.


Connect asep suth ans?

COMMON LOCATIONS AND AUTO START ENTRY POINTS(ASEP) OF VIRUSSystem Registry Run Keys• System Registry Run Keys - Certain registry keys may contain values used to load applications (including malware) when Windows is started. The values to examine are located in subkeys Run, RunOnce, RunServices, and RunServicesOnce, located in either of the following registry keys:• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup Folder• The Windows Startup folder can include shortcuts, documents, executables, or other types of files and programs to be launched when Windows is started. The current logged on user can view startup folder inclusions through the Start menu:• Start | Programs | Startup• The common startup folder, applicable to all users, correlates to:• %ALLUSERSPROFILE%\Start Menu\Programs\StartupWinlogon• Winlogon is responsible for supporting the DLL responsible for managing the interactive logon when Windows starts. Pre-Vista, that DLL provides a customizable user interface and authentication process.• Malware that hooks into Winlogon can be particularly difficult to remove, as even booting into Safe Mode will not deactivate it. The string values that customize the Winlogon process are located in the following registry key:• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonASEP Loading SequenceThe order in which Windows processes the autostart entry points is as follows:• RunServices / RunServicesOnce - HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER RunServices/RunServicesOnce will be launched concurrently. In the event of a conflict, precedent is given to HKEY_LOCAL_MACHINE. These ASEPS may continue loading during and after the login dialog.• Login Dialog (Winlogon)• RunOnce / Run for HKEY_LOCAL_MACHINE hive• Run key in HKEY_CURRENT_USER hive• Startup Folder• RunOnce in HKEY_CURRENT_USER hiveSome Advanced Loading points which are identified recently with rootkit enabled malwares• C:\Documents and Settings\• C:\Documents and Settings\\Application Data\• C:\Documents and Settings\• C:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5• C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5• C:\Windows\Temp• C:\WINDOWS\system32\config\ systemprofileStartup and Winlogon• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices• HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon• HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler• HKEY_CLASSES_ROOT\comfile\shell\open\command• HKEY_CLASSES_ROOT\piffile\shell\open\command• HKEY_CLASSES_ROOT\exefile\shell\open\command• HKEY_CLASSES_ROOT\txtfile\shell\open\commandServices• HKLM\SYSTEM\CurrentControlSet\Services\• Active Setup Stub Keys (These are disabled if there is a twin in HKCU)• HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\• ICQ Agent Autostart• HKCU\Software\Mirabilis\ICQ\Agent\Apps• If you suspect that a system is infected, then examine each of these keys. Determine whether Value Name or Value Data, including the (Default) value, refers to a suspicious file.Internet Explorer (To check for IE threats)• HKLM\Software\Microsoft\Internet Explorer\Main, Start Page• HKCU\Software\Microsoft\Internet Explorer\Main: Start Page• HKLM\Software\Microsoft\Internet Explorer\Main: Default_Page_URL• HKCU\Software\Microsoft\Internet Explorer\Main: Default_Page_URL• HKLM\Software\Microsoft\Internet Explorer\Main: Search Page• HKCU\Software\Microsoft\Internet Explorer\Main: Search Page• HKCU\Software\Microsoft\Internet Explorer\SearchURL: (Default)• HKCU\Software\Microsoft\Internet Explorer\Main: Window Title• HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: ProxyOverride• HKCU\Software\Microsoft\Internet Connection Wizard: ShellNext• HKCU\Software\Microsoft\Internet Explorer\Main: Search Bar• HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks• HKLM\Software\Microsoft\Internet Explorer\Search, CustomizeSearch =• HKCU\Software\Microsoft\Internet Explorer\Search, CustomizeSearchIdentify Rootkit InfectionsMSconfig -> Boot.ini tab -> Check /BOOTLOGRestart the computer.Go to c:\windows and open the file c:\windows\ntbtlog.txtCheck for any suspicious entries.Program Removal• Click on start->control panel->add/remove programs icon.• Discuss with customer about any new program which is installed. If customer does not know about a particular program, follow the steps below -o Click on start->My computer->Local drive C:-> Program files.o Right click on the particular program folder-click on properties and check date created. Repeat the same to all new programs and close the program window.Physical Location• c:\program files• c:\program files\common files• C:\documents & Settings\User\Application DataRegistry• H_Key_Local_Machine\Software• H_Key_Current_User\Software• H_Key_Local_Machine\Software\Microsoft\Windows\Current Version\UninstallFile Removal GUI Mode• Delete - Right click -> Delete or Higlight the file and hit the Delete button on the keyboard• Rename - Right click -> Rename or Highlight the file -> Press F2 -> Type a new name -> Hit enter• Move - Right click->Cut->Right click and paste it on the desire location• Removing Permissions - Right click on file ->Go to properties ->Click on Security Tab ->Click Advanced -> Uncheck the box "Inherit from parent control…." -> Click Remove ->Click OK


What extra functionality does BHO add to Microsoft Internet Explorer?

BHO provides an extra functionality to Microsoft Internet Explorer which is known as the browser helper object. It helps users manage any add-ons such as a search tool bar or opening a program.


Microsoft internet explorer is what kind of program that allows you to view the contents of the world wide web?

Internet Browser. Allows users to browse web pages on the Internet. Standard Microsoft application since (at least) Windows 95.