The Wacky World of Windows Internet Security Settings

About problems you may have with this and other websites if you use Internet Explorer.
Index

Introduction

   Starting with Windows XP Service Pack 2, Microsoft has been adding odd restrictions and warnings to Internet Explorer (IE). Those changes could cause confusion and problems for people visiting this website. In particular, people using IE version 6 or later, in Windows XP or Windows Vista/7, may be faced with misleading security warnings, lack of functionality, or trouble downloading files from JSWare. You may be misled into believing that there are problems with this website, with files from JSWare, or with files from other websites. The problem got so bad that this explanatory webpage became necessary. But the problem is not with JSWare or any other website. The only problem is with Internet Explorer itself.

   This webpage has two main purposes:

1) To help people using Internet Explorer who may have problems or questions in using this website.

2) To provide general Internet Explorer security information that may be helpful to anyone who uses IE online.

If you are not attached to using Internet Explorer...

you may want to try another browser
, such as Firefox, the similar Pale Moon or K-Meleon, or Opera. All are free and all have better security records than Internet Explorer. All four also have security and privacy settings that are far easier to use than those of Internet Explorer. You can say goodbye to IE, a browser that is designed specifically for the commercial exploitation of its users. You can also say goodbye to the ever-increasing nags, restrictions and malfunctions that are being added to IE.

If you do not use Internet Explorer, or if you intend to switch....

you may find the Browser Tips Page useful. It provides a compact synopsis of advantages, disadvantages, options, esoteric settings, and security/privacy issues with each popular browser.


If you want to use Internet Explorer, or if you have no choice...

then you need to be aware of the following: Internet Explorer has a long history of security problems that are not easy to fix. More recent versions of Internet Explorer also have new problems related to Microsoft's commercial strategy. Those problems are addressed here because Microsoft's commercial strategy -- their ongoing attempt to control the Internet and "e-commerce" by controlling the browser -- has actually become a potential obstacle and cause of confusion for people visiting this website.


   Internet Explorer 6 in Windows XP with Service Pack2 added annoying and confusing warnings and nags that pop up when files are downloaded.

   Internet Explorer 7 added two new dubious "features": One is a new "phishing filter" (AKA SmartScreen Filter) that is virtually useless, and is also spyware when used as suggested. (It reports your Internet activity to Microsoft.) The other is a new scam aimed at further "corporatizing" and commercializing the Internet, while masquerading as a security improvement: Corporate websites can buy a new special license that will cause Internet Explorer's address bar to turn green when you visit their website. The green bar is meant to tell you that it's safe to open your wallet and allow that website to vacuum out any "greenbacks" that might be in your wallet. This new gimmick is meant to encourage online shopping. But just as with digital certificates in Internet Explorer 6, the green bar does not mean that you don't have to worry about spyware, adware, or privacy intrusion at the given website. Rather, the green bar just means that the website is owned by a corporation that bought a license or "certificate". (Actually, spyware companies have been among the most dependable buyers of "digital certificate" licenses. Having a digital certificate allows them to force-install adware -- the so-called "driveby download" trick -- by exploiting bugs in Internet Explorer.)

   Internet Explorer 8 brings more new problems like DOM Storage (the so-called supercookie) and Suggested Sites, another spyware feature. New features that might seem useful include InPrivate Browsing which prevents your online activities being recorded in IE's "History", and InPrivate Filtering, which can block such things as 3rd-party cookies. But the InPrivate "features" are cumbersome, must be turned on anew each time they are used, and are still inferior to the settings already available in most other browsers. The IE8 privacy "enhancements" are just another case of Microsoft's standard strategy:

   When the general public becomes interested in having functions that conflict with commercial exploitation of the Windows "user", Microsoft will add those new functions but render them unusable. "Undesirable" functions such as privacy features are made difficult to understand, requiring both education and specific actions on the part of the end user. That way very few people will ever really use or understand those functions. And in most cases people will blame themselves for being insufficiently "tech. savvy".

   Examples:

•  IE has had an option to block 3rd-party cookies for many years. But few people know that or understand what it means. And the actual setting is hidden behind an intimidating button marked Advanced, so most people will never be aware of their options.

•  See this Wall Street Journal article for an inside look at how the planners at Microsoft deliberately pulled off the "InPrivate Browsing" scam to thwart privacy and security for people using IE8.

•  Anti-Tracking Privacy Initiatives: A Scam Sleight of Hand

   As of late 2010 Microsoft has generated a big hoopla about their alleged "anti-tracking tool" in Internet Explorer 9. (The Microsoft PR machine is very successful in getting these PR releases spread widely. Even BBC News was stupid, inattentive, or cozy enough to headline the story.) The claim is that Microsoft will help people to avoid being tracked online. But the details say otherwise. The tool planned for IE9 would need to be turned on first. Then people would need to add URLs to the list to be blocked or enabled. If you look at Microsoft's own announcement and scroll down the page you can see an example of this list. It's an absurdly complex piece of superfluous XML code that an average programmer would find tedious to work with. To anyone else it's undecipherable gobbledygook. In other words, the planners at Microsoft know perfectly well that, once again, they will not have to worry about people actually using this new function.

  Microsoft (and many other online corporations) don't want people to have privacy online for commercial reasons. Online advertising is more profitable and desirable if the advertisers can know about the personal details of their target audience. By making new privacy features essentially unusable Microsoft gets it both ways. They can claim to be acting in their customers' interests while actually doing precisely the opposite.

Microsoft actually bought AQuantive in May, 2007. AQuantive is an online advertising company similar to Google's Doubleclick. So it is not only Microsoft's business partners who have a stake in preventing online privacy. Online privacy is in direct conflict with the financial interests of Microsoft themselves -- the monopoly provider of PC operating systems, the provider of the most-used browser, and now one of the biggest online advertising companies.

   Though it should be stressed that this is not only a Microsoft problem. Most major online corporations, including Google, Facebook, etc. have opted to pursue more money by selling out their customers' privacy, thereby creating a double bind for themselves: They can make more money while losing trust, but risk eventually making less money due to their sullied reputations. With all of these corporations, if they want to focus on profits they simply cannot afford to be honest about their spying/tracking activities.

   In connection with increased attention to online tracking, the FTC has got involved, suggesting a "Do Not Track" list that they liken to the telephone "Do Not Call" list. But the analogy does not hold. It downplays the severity of the problem. A true "Do Not Track" list for the Internet would be more analogous to a "Do Not Wiretap" list for telephones. That is, the problem of online tracking is not that people are exposed to ads. The problem is that creating targetted ads requires spying on people. Why should the public be required to formally request each online company not to spy on them? (Note that this is in reference to browsers visiting websites. The spying that goes on with free "webmail" services and mobile phones is already, quite literally, wiretapping, and the FTC appears to have no curiosity about that. See this WSJ article about cellphone apps and this article at The Register about the secret keylogging software installed onto many cellphones.) The FTC would seem to be, at best, a Sleepyhead guarding the foxhouse. And what has this got to do with the FTC, anyway? Why isn't deliberate, systematic corporate surveillance of private citizens a criminal matter? We seem to be developing a bizarre double standard, whereby commercial entities and law enforcement are allowed to spy on you, rifle through your desk, or intrude into your home without right or cause, so long as it's an electronic rather than physical intrusion.

   See the Online Privacy Tips page for a further discussion of privacy issues.

   So there are two different, but related, issues addressed on this webpage: 1) General Internet Explorer security problems and 2) the ever-increasing Internet Explorer warnings, nags and alleged security enhancements, which, in addition to damaging general usability with IE, also constitute a veiled effort to commercialize the Internet by creating the illusion of safety on corporate, commercial websites while calling into question the credentials of private websites and "mom-and-pop" online businesses.

Back to Top

Explanation of Warnings When Files Are Downloaded and/or Opened

   When you download and/or open files from JSWare with Internet Explorer in Windows XP with Service Pack 2 (WinXP SP2) or later, you may see a popup message entitled "Security Warning". The warning is a result of changes made in SP2 and has nothing to do with the files from this website. You can safely ignore the warning. Or see below for a solution to stop the warnings.

The Full Story
   Windows XP SP2 added a number of security changes to Internet Explorer. One of those changes is to check downloaded files that may be executable, or that may themselves contain executable files, to see whether they have a "digital signature". If a valid digital signature is not found IE will then display a "Security Warning" popup that says, in part, "The publisher could not be verified. Are you sure that you want to run this software?....You should only run software from publishers you trust." The warning implies that the downloaded file could be somehow dangerous and that the source may be somehow not "trustworthy".
What is a digital signature?
   A digital signature is an encrypted code that can be used to mark files. It is a license of sorts. Various companies set themselves up as "certificate authorities" to sell this service. Other companies pay the certificate authority and in exchange get a "signing key" with which to mark their files. The certificate authority holds a corresponding key. There are various types of certificates. In this case the certificate is specific to Internet Explorer.
  The way it works is that Ace Software pays Acme Certificates for a key, with which Ace marks their software files. When you download a file from Ace Software, Internet Explorer can send the key to Acme Certificates to have it checked for authenticity, to make sure that the file really came from Ace Software.
Why are digital signatures used?
   Digital signatures have mainly been used to verify the source of ActiveX controls being loaded by webpages. ActiveX controls are actually small programs that can be embedded in webpages and run in Internet Explorer. Microsoft invented ActiveX controls, in part, as a way to extend the functionality of Internet Explorer. An ActiveX control might do anything that normal software does. It might be a graphical element like a chart or button. Adobe's Flash is also an ActiveX control when it runs in IE. A control might also be software that accesses your files. All of these types of controls are actually executable programs, like EXE files. They are not part of a webpage. They are run on your PC by code in the webpage.

   Since ActiveX controls are usually loaded silently without user interaction, there needs to be some kind of system in place to prevent malicious websites from loading and running unsafe ActiveX controls. Digital signatures were implemented for that purpose, as an attempt to make ActiveX controls safe by applying security restrictions with regard to what files a website might run from a webpage.
What is different since Windows XP Service Pack 2?
   Starting with Windows XP SP2, Microsoft made a unilateral decision that many files offered for download should be marked with Microsoft's "Authenticode" digital signature, which can be recognized by Internet Explorer. IE has been redesigned to monitor not just the loading of ActiveX controls, but also voluntary, deliberate actions on your part. If you download and open files that do not have a Microsoft-specific digital signature you will be warned that the file may not be "trustworthy". Depending upon your security settings, Internet Explorer may even block the download with a message saying, "your current security settings do not allow this file to be downloaded”.

   JSWare does not use digital signatures, "Authenticode" or otherwise. We do not agree with the notion that we should need to have an official Microsoft license in order to offer data files, images, software, etc. to the public. If you download files such as program installers for WEB-ED Editor, JS PhotoPrep, etc. you could receive a warning about the safety of those files. This is not a problem with files from JSWare. It is a problem with Internet Explorer.

   Also note: A digital signature or certificate does not necessarily indicate a reputable company. It's not impossible to forge digital certificates, and anyone willing to pay a modest fee can buy one. See "How VeriSign Could Stop Drive-By Downloads" for an interesting discussion of how numerous sleazy companies buy digital certificates in order to exploit bugs in Internet Explorer that allow them to force-install spyware and adware. (In other words, digital certificates have become a way to bypass security restrictions in IE.) Other related links of interest:   This article and this article at The Last Watchdog discuss increasing problems around certificate forgery and theft. This one at Ars Technica describes how websites that use the "TrustE" logo are more likely to be unsafe. And this one at Ars Technica describes Versign's attempt to get in on the "trustworthiness" business with yet another certificate or "trusty logo". In short, there's a lot of money to be made online IF people trust online companies. And there's a lot of money to be made in the trustworthiness business. Unfortunately, though, online security is not getting better. Aside from malicious hackers, the big corporations running big online business have become the biggest threat to security and privacy.
Why is Microsoft trying to oversee downloads?
   Why, indeed. It has never been the job of a browser to oversee what you download. How is it that Microsoft thinks their browser program should second-guess your actions? And they won't even admit that that's what they're doing. One of the newer warnings says something like, "your current security settings do not allow this file to be downloaded". Yet you probably don't remember choosing those particular security settings...because you didn't. Microsoft did. (And those settings are not "your security settings". Just as with the "Internet Options" applet in Control Panel (which actually just goes to the IE program settings), Microsoft is deliberately conflating Internet Explorer settings with Web-related settings in general. Part of the reason for this webpage is that many people who are enduring frustration with blocked downloads do not realize that the problem is actually coming from Internet Explorer.

   The Security Angle

   Ostensibly these nags and restrictions are in the interest of security, but it's not quite that simple: Internet Explorer has had a bad reputation in terms of security for many years. Microsoft is under pressure to do something about it. But they can't do very much. The only way to make IE even moderately safe to use would be to disable scripting and ActiveX, or at least to make it very easy to only enable those functions on specific websites where they are absolutely necessary. Script is the weak link in browser security. It is required for the vast majority of online attacks. Script clearly should be disabled by default. ActiveX is worse. So why not have a big red button on the browser's toolbar that says, "Enable active content for this page only"? The problem is that if Microsoft even just disabled ActiveX by default then many webpages that depend on it would cease to function and Internet Explorer would get an even worse reputation than it currently has. The elephant in the room here is that people want "Web 2.0" interactive, online services, like Facebook, maps, automated shopping, dating sites, banking, bill paying, etc. And online companies want to sell those services. And those interactive services require script, Flash, etc. -- executable code running through the browser. But online activity can never be safe as long as it requires enabling executable code. No one on any side of the issue wants to admit that.

   Since Microsoft cannot really fix their browser, they are instead trying to shift the focus of the security debate. Microsoft wants to portray the Internet as a fun and colorful shopping mall, where you can safely open your wallet wide as long as you trust Microsoft to protect you from "baddies" and busy yourself with "consuming services" from "trustworthy" sources. (That is, large corporations like Microsoft and their partners.)

   This confused, mixed-motive security focus at Microsoft - restricting the functionality of Internet Explorer without fixing the real security problems - has resulted in an increasingly absurd situation: In a January 2005 interview, Bill Gates was asked about the fact that people are abandoning Internet Explorer for security reasons. He responded,

   "Well, no one invests more in security of their browser than what we do on IE. The key message we have for people is they should turn on auto update because if you turn on auto update....you can know that there are hundreds of very smart people who are constantly improving your browser and making sure that you're safe. And so with auto update and IE, you're getting the top security team and the quickest response team that there is anywhere."

   It's understandable that Bill Gates would want to show IE in a good light, but there's a comic irony in his statement: At the moment that Bill Gates was speaking those words, while the latest version of Internet Explorer was pestering people about downloading "untrusted" files, it was also being attacked by mere webpages, through bugs present in the then latest Windows update that allow code to be run on a client computer by just visiting a webpage using IE. Those "hundreds of very smart people" comprising the "quickest response team", working "constantly" for over two months, had yet to come up with a solution to make it safe for people to just open a webpage in Internet Explorer. In fact, according to reports, that "quickest response team" left Internet Explorer vulnerable online for a total of 284 days in 2006! Some known bugs have gone unpatched for over a year by that "quickest response team", such as this threat in July, 2009.

   By 2010, several years after Microsoft started with the nags and restrictions in IE, little was changed. In February 2010, MIT's Technology Review ran this article about grave problems with IE security. This particular case clearly demonstrates the fundamental pathology of Microsoft's approach to security: When Microsoft was informed of the problems their response was that they "...could not patch some of the flaws... In some cases, this was because the flaws were closely related to intended features of the browser." Microsoft's answer to the problem typically missed the point. They recommended more restrictions and more of their famously obscure and convoluted Registry settings.

   So what's the solution? Would Bill Gates have us require that all webpages also include a Microsoft digital signature before they can be viewed? Then again, another bug allowed a computer to be attacked by merely viewing a JPG file. And 2010 brought a steep rise in attacks that exploit scripting bugs in Adobe's PDF files and Flash cartoons. So maybe all files should have Microsoft digital signatures? Or should we perhaps just let Microsoft run the Internet, in the interest of safety? Ahh.... funny you should mention that...

   The Commercial Angle

   There is also another important point to be noted here in regard to digital signature warnings: As the explanations above make clear, digital signatures and "trustworthiness" are generally a commercial, corporate phenomenon. Small companies and individuals usually don't mark their files with digital signatures. So the increased "security" nags dovetail with Microsoft's ambitions to commercialize the Internet for their own purposes. Clearly, inexperienced users of IE who have seen a few of those "Security Warning" popups are likely to get the impression that only corporate, commercial products, from companies cooperating with Microsoft, are safe to download and use.

   The fact is that Microsoft is only one of many corporate entities who would like to "de-democratize" the Internet and reduce it to merely a giant, corporate shopping mall free of private websites and free of "mom-and-pop" competition. But Microsoft is in a uniquely powerful position due to their PC operating system monopoly. The "security" changes in Internet Explorer are in line with Microsoft's move toward recreating Windows PCs as web-service appliances. (The Register did an interesting analysis of this situation as long ago as October 2003). Bill Gates, after all, has claimed that Microsoft virtually invented the PC. Given past Microsoft exploits such as their "Passport" project, it would appear that Mr. Gates and Mr. Ballmer honestly believe they are justified in trying to control, and collect tariffs on, Internet commerce. And the best way to control online business is to control the bottleneck of online experience: the browser.

   For further discussion of the commercial implications involved with the changes in WinXP SP2+ see the Overview - Windows and the Web... topic below.
What to do about the download warnings?
   So what should you do about Internet Explorer download warnings?

   If you are concerned about online safety but also do not want to be wrestling with an onslaught of specious restrictions and warnings, the easiest solution is to simply stop using Internet Explorer online. IE has a long history of security problems. In fact, the US-CERT (US Computer Emergency Readiness Team) has warned about the risks of using Internet Explorer.

   The Firefox and Opera browsers both have a far better security record than Internet Explorer, and both are far more user-friendly in terms of having clear, accessible settings. (Note: The Firefox browser is funded in large part by Google, which has had a corrupting influence. For example, the cookie settings in Firefox 3 have been hidden behind the nonsensical "custom history settings". Google does not want people to delete cookies. Period. Nevertheless, Firefox settings are still far more usable than IE settings. See the Browser Tips page for further info. about customizing Firefox and fixing its drawbacks. Also, try the K-Meleon browser for something that's essentially Firefox without the commercialization and excessive bloat.)

   If you still want to use Internet Explorer, or if you have no choice, see the topic below, Fixing Internet Explorer "security improvement" Nags, for options.

   Don't expect to actually fix Internet Explorer. IE has literally thousands of confusing - and often conflicting - settings. And it has numerous weaknesses that don't exist in other browsers, such as Browser Helper Objects, ActiveX, etc. It is questionable whether a basic, reasonable level of security and privacy online are possible at all while using Internet Explorer.

Back to Top

The Madness Continues with .Net - ActiveX Redux:
   In December 2010 Microsoft warned, here and here, about a serious attack that could take over the PC of anyone using any version of Internet Explorer if they visit an infected website. The problem was said to be a bug in one of the parts of IE. (mshtml.dll)

   What Microsoft did not make entirely clear was that the attack also depends on a bug in another file: mscorie.dll. As explained here, mscorie.dll is actually part of .Net, not IE. They also did not mention in the "Workarounds" section of their warning that people with .Net installed might uninstall or disable it to protect themselves from the attack. That's because Microsoft do not want people to think of .Net as an optional product.

   Mscorie.dll is used so that "Web-based applications can use Microsoft Internet Explorer 5.5 and later to download and run Microsoft .NET Framework assemblies." In other words, this buggy attack vector is a .Net component designed to allow websites to download and run software on your PC! .Net is Microsoft's competitor to Java. Like Java it's mainly web-oriented. Like Java it adds additional security risks online. Also like Java, most people using PCs don't actually need it. For anyone who has not installed .Net-based software, .Net just adds unnecessary bloat and risk.

   This is history repeating itself. Microsoft defeated Netscape, in part, by making IE more powerful than Netscape. They did that by tying IE into Windows and adding to IE the ability to use ActiveX controls (Windows components). But that strategy was also flawed. ActiveX was designed for use in both IE and Windows. As a result it was not optimized for either, and it introduced a new class of IE security problems: system components that could be commandeered through webpage code. Now Microsoft is trying to do the same thing again in their attempt to compete with "cloud" software. Microsoft are tying their gigantic .Net system into both Windows and IE. Again their strategy holds the promise of highly functional, "rich" software running through IE. Again it's a fundamentally flawed, unsafe strategy. And again it results in a compromised product: not optimized for Windows and not safe in the browser.

   In fact, with IE9 and IE10 Microsoft seems to be determined to fully return to the problems of the 90's. IE9 will only run on Windows Vista/7. IE10 will only run on Windows 7. Microsoft is moving to tie IE deeply into Windows again, and trying to cast that move as a browser improvement.

Back to Top

Fixing Internet Explorer "security improvement" Nags

   The IE-MD is a utility written specifically for controlling obscure settings in Internet Explorer. It's somewhat out of date now, especially for people on Windows 10, but may be useful to people using older IE versions.

As of November, 2011, the IE-MD was updated to support IE versions 5-8. IE-MD is a free HTA program. That is, it's a webpage "program" that you run on your PC, in Internet Explorer. The webpage creates an interface to provide easy buttons and checkboxes that can be used to adjust numerous harassing, maddening, restricting -- and mostly hidden -- Internet Explorer settings. (It should work fine with IE9, but IE9 is very limited, only able to run in Windows Vista/7, so it has not been specifically treated in this update.)

Download IE MD

Back to Top

Note to Scripters: Adjusting Security Settings

   Among the security changes that Microsoft has made starting with WinXP SP2 is a decision to make IE Local Zone security very high - higher, in fact, than security in the Internet Zone! (If you are not familiar with IE security zones see the "IE/OE Security Model" section below.) Many people may not notice the Local Zone security change but it may affect scripters and will affect some of the VBScript samples available from this website.

   Microsoft is calling this new security arrangement "Local Machine Lockdown". The default behavior in the past has been that you would receive a warning prompt when running "unsafe" script in the Local Zone. With "Local Machine Lockdown" there is no warning. It simply disables active scripting functionality for files on your computer. It means that any webpage file on your computer that includes active scripting will not work properly because active scripting and ActiveX (as well as MSJava) will be blocked and you will not be given a choice in the matter. The setting to control this behavior is hidden.

   The one place where it is reasonably safe to use Internet Explorer - offline - is now the only place where IE has high security!
Help for IE Problems in WinXP and Vista/7
   This section is mainly for people, especially scripters, who want to use IE in the Local Zone (on their PC) without restriction. The information here is generally relevant for Windows XP/Vista/7 with IE6 and later. Each version of IE and each version of Windows has been more complex and restricted than the last, but many of the issues are common to all versions. See the IE-MD download for detailed information and sample code related to IE security and restriction issues.

   When Microsoft came out with Windows XP SP2 they added the new "Local Machine Lockdown" (LML) for Internet Explorer Local Zone security. Microsoft presented LML as an extra security feature with its own Registry setting. But their official description was not entirely accurate. There are specific LML Registry settings, which can be used to apply or remove LML restrictions on specific programs, but the LML settings are really a flag rather than a setting. They dictate how all other security settings are read and interpreted -- whether your security choices for the Local Zone are respected or secretly overridden by other, hidden settings. Interestingly, Microsoft has actually built in these hidden settings since XP SP2 for all zones. Although the new function is called "Local Machine Lockdown", it is really "Total User Choice Override". However, as of this writing the lockdown "feature" seems to only be applied in the Local Zone.

   The Local Machine Lockdown scenario is so ridiculous and complex that it is difficult to even describe. But for the sake of anyone who wants to really control Internet Explorer security, here goes....

Background:
   Before Windows XP SP2, IE security settings were already absurdly complex. There are dozens of settings - which have changed somewhat with each IE release - that apply to 5 different security "zones". The Local Zone is your PC. The Internet Zone is most other webpages. Then there are 3 optional zones that can be applied to specific domains. All of these zone security settings are stored in the Registry, under both HKLM and HKCU keys, in the subkey
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\
There are 5 subkeys there, named 0, 1, 2, 3 and 4. According to Microsoft's documentation, with IE6 each of these subkeys contain some 57 settings for the given security zone.

   To complicate matters, the Local Zone (zone 0) is normally hidden on the Internet Options Security tab. So the average person has no way to actually see or change Local Zone settings. To complicate matters further, there is also an optional hidden setting that will cause all settings selected by a particular user (stored in the Registry under HKCU) to be overridden by an identical set of settings which apply to all users (stored in the Registry under HKLM). Yet the settings you see in Internet options will still be those you selected -- your personal settings, which are not actually in effect!

   So Internet Explorer security settings are a convoluted, confusing mess that is partially hidden.

   But that was just before Windows XP SP2.

   After SP2 the confusion and the mess have doubled. Microsoft created an entire second set of security zone settings in the Registry. This new set is stored here:
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\

   So now, for any given security setting in IE, such as whether to allow scripting, there are 5 possible zones stored in 4 complete sets of Registry keys. (HKCU normal, HKCU lockdown, HKLM normal and HKLM lockdown.) That means there are 57 settings times 5 zones times 4 sets. That is, there are some 1140 Registry values that control Internet Explorer security settings. Or rather, there are some 1140 Registry values which may or may not be reflected in the Internet Options Security tab. Some security settings are also spread around, willy-nilly, on the Advanced tab and Privacy tab.

   When LML is in effect, all security settings for the Local Zone are read from the secondary Lockdown_Zones keys. You can fiddle with Local Zone settings " 'til the cows come home ", (provided that you even know how to make those settings visible) and it will have no effect. Also, the way that Microsoft designed the Lockdown_Zones Registry keys provides an option in the future to override all user-selected IE security settings for all zones, not just the Local Zone. The Lockdown_Zones Registry keys for all zones are already present and can be used via the Group Policy Editor.

   Given the redundant, misleading and generally confusing nature of the entire Local Machine Lockdown boondoggle, it seems best not to think in terms of LML, but rather to just think of all IE security settings as requiring 4 Registry values per setting, per zone. In other words, if you want to change how IE runs locally, forget LML and just set all four versions of the setting, under both Zones and Lockdown_Zones in both HKLM and HKCU.

  But wait, that's not all...

   Did we say you get 1,140 looney, redundant, confusing, poorly documented settings? Double that! As of Windows XP SP2 you now get over 2,000 security settings, thanks to new Group Policy settings. To make a long story short, Microsoft has added an entire duplicate set of IE security settings that are just like the original Zones and Lockdown_Zones keys in HKLM and HKCU. Each of those 4 keys now has an equivalent with the same Registry path, except that it's under \Software\Policies\Microsoft\... instead of under \Software\Microsoft\... These new "Policies" settings, when present, override the "real" IE security settings!

  Wait a minute...Give me that again?...

   To recap: Imagine that you are using the original version of Windows XP and you want to disable scripting in Internet Explorer. First of all, it's not that easy. In Firefox you open the settings and uncheck "Enable JavaScript". In Internet Explorer there are numerous settings: "Initialize and script ActiveX controls not marked as safe", "Script ActiveX controls marked safe for scripting", "Active scripting", "Allow paste operations via script", "Scripting of Java applets", ...etc. Which one(s) do you want? Most people won't understand the terminology and the Microsofties can't be bothered to explain them in the IE help. (After all, they don't want you to disable script in the first place. They want to sell you online services that require script and they want to use script as part of their arsenal to track your online activities, for the purposes of targetted advertising.) But for the sake of explanation, just pretend for a moment that IE actually has a setting to disable script. In the original version of XP you need to first decide which zone you're dealing with. Do you want to change the setting for pages on your PC? On the Internet? On a company intranet? In your Outlook Express email?... (Yes, Outlook Express is part of this mess, too. Don't ask.) Once you have figured out which setting you want to change, there are two values in the Registry that must be changed in order to be sure that you have actually changed the setting. So, IE4/5/6 before XP SP2 was already an unusable tangle of confusing, obscure settings with no documentation.

   Now imagine that you have just installed XP Service Pack 2. As part of that update Microsoft created a mirror-image set of IE security settings in the Registry. They doubled the settings. Then they doubled them again. So you now have 8 separate, complete sets of Internet Explorer security settings where there used to be two, and where there should be just one. If it were even possible to disable script with one IE security setting, you would now need to change 8 different Registry values in order to do so.

How did Internet Explorer security get so messed up?

   It's relevant to note here that this problem is multi-facetted. Once one knows just how bizarre the IE settings have become it's tempting to think that the Microsofties have just plain "gone off the deep end". But bloat is only one factor. The LML problem is because Microsoft generally takes the approach that you are not fit to control your own settings and therefore should not be allowed to.... So your actions will be restricted for your own good.... And you won't be given control over that. There is a long history of "secret tweaks": deliberately obscured settings known only to those who are sufficiently curious -- or desperate -- to hunt them down.
   The Group Policy settings are part of another Microsoft tradition: All versions of Windows are basically designed to be corporate workstations for use by employees with limited permissions. Microsoft doesn't actually make different versions of Windows. They make one version with more or less functionality added or removed. So, strange as it may seem, there is no such thing as a version of Windows designed for use by people who own their own PC and have a right to do as they like with it.
   Microsoft has always designed IE the same way, with system administrators in mind. The Group Policy settings, along with the HKLM-override setting, are there so that corporate system administrators can override employee settings, without the employees knowing it. The security settings window itself can even be removed via the Registry. That functionality is how AOL created their browser. It was just a customized version of IE with some of the settings made unavailable.

For what it's worth... A script to toggle security in Local Zone

   A script is being provided here that deals with the mess described above, presenting a simple option to toggle between restricted security and normal security for IE in the Local Zone. The script also provides example code that shows how to deal with these settings under Local Machine Lockdown and with the new "Policies" settings mess. Actually, there are two scripts. One shows how to set Local Zone, LML and Group Policy settings simultaneously, effectively nullifying LML and the new "Policies" keys. The other script uses a different Registry setting altogether to exempt IE from LML.

    Download IE Local Zone security script

   For a more convenient way to deal with this mess, see the IE-MD page.

About the settings in the Internet Options window

   The Internet Options window has become all but useless. One can make the Local Zone settings visible in XP, but not in Windows 7. In Windows 7 you can make the Local Zone icon visible, but if you click it nothing happens. Access to the Local Zone settings is blocked. You are simply not allowed to adjust local IE security. But even in XP, where one can access the Local Zone settings, the Local Machine Lockdown mess affects the Local Zone settings view. You will see either the actual Local Zone settings that you control, but there's no easy way to know whether those settings are being overridden by the LML settings. (Not to mention the Group Policy settings or the semi-secret HKLM override setting.) So one really has no choice but to treat IE security settings as having 8 Registry values per setting, forget about trying to figure out how and where LML applies, and forget about trying to use the Internet Options window to adjust any of these settings.

   Increasingly, only people intimately familiar with the IE Registry settings can know whether they are really controlling Internet Explorer security. An interesting discussion along those lines is offered by a Microsoft blogger here:
http://blogs.msdn.com/alialvi/archive/2006/10/22/why-is-my-computer-zone-hidden-in-inetcpl-in-internet-explorer-and-how-do-i-make-it-show-up.aspx
   The blog posting poses the question, "Why is "My Computer" Zone hidden in inetcpl in Internet Explorer and how do I make it show up?". (inetcpl is the Internet Options settings window of IE, which is the same thing as Control Panel -> Internet Options.) The blog author, one Ali Alvi, is on the "Internet Explorer Team". His words provide a good example of two longstanding Microsoft traditions: 1) Condescension toward their customers and 2) routine creation of unnecessary abstruseness in Microsoft products. Mr. Alvi partially details the absurd state of IE security settings for the Local Zone, leaving one more confused by the end of his posting than before reading it. He seems to be unaware of, and unembarrassed by, the sheer preposterousness of his description of IE as something akin to a broken Rube Goldberg machine. Mr. Alvi then concludes, "I think its (sic) best not to mess with the Local Machine Zone policies at all." Indeed.

Using HTAs

   As most scripters probably know, if you rename a webpage file with the extension .hta instead of htm, html, etc. it becomes an "HTML Application". An HTA is opened by MSHTA.exe, a wrapper program that encapsulates an IE browser window and has no security restrictions at all. While HTAs are a potential security risk, and not a realistic way to make webpages functional on the Desktop, they do provide a very good alternative for people who want to create HTML/script-based utilities. With an HTA there is no need to be concerned about LML or IE settings in general. However, expect more problem with restrictions, even in HTAs, if you update your version of IE past v. 6.

Resources
You can download the SP2 "white papers" from Microsoft here.
An article about the SP2 changes is here.

Back to Top

Overview - Windows and the Web, from Active Desktop to Vista/7

   As Microsoft's major software products, such as Office and Windows, have reached maturity (and beyond) the company can no longer depend on constantly expanding sales. In response to that Microsoft has been moving toward a business model of "web services" - leasing software-based services that can be billed over and over again, rather than selling software that can be sold only once. Microsoft has been trying to market an online version of Office and each new version of Windows moves closer to being a "web service" in itself, taking more control away from the PC owner and adding more online communication that happens with neither the consent nor even the informing of the PC owner. (In other words, spyware.)
   Windows programming has been moved to ".Net", which is Microsoft's version of Java. Microsoft has released Silverlight, which is Microsoft's answer to Flash, based on .Net. And Microsoft's Azure web hosting service is intended for .Net developers who want to host "rich" web services online. All of this is coming out of the software rental paradigm.

    With respect to the push to sell the idea of the PC as a "web services" appliance, it is interesting to note that for the first time, as of WinXP SP2, Internet Explorer and Outlook Express updates were presented as part of a Windows update rather than as separate software updates. Microsoft has long claimed that IE is "part of Windows" but this was the first time they treated it as part of the core system libraries, refusing to publish a stand-alone update that can be installed on earlier Windows versions. That move, subtle on its face, makes a bold step toward redefining web browsing as a built-in function of the operating system.
   To some extent the change in direction toward "web services" began as far back as 1998, when Microsoft released the Active Desktop update. Active Desktop involved folder windows with links that worked like webpages. It also introduced the idea of "subscribing" to online "content" through the "Channel Bar", which was a commercial billboard stuck to the Desktop with logos for companies such as Disney and Warner Brothers. One could click the logos to see the latest updated webpages from those companies. The Active Desktop idea never really took off. People were not interested in subscribing to what were essentially corporate advertisements, and although the people at Microsoft seemed to be enthralled with the idea of the browser (and by extension the Web) being blended with Windows, it really meant nothing from the point of view of using Windows PCs. People went online to browse the Internet and opened a folder to find their files. The fact that one could go online directly from a folder window, through the pretense that Internet Explorer was part of Windows, was simply not relevant.

   Most of the Active Desktop "features" gradually faded away. But the point of view that engendered Active Desktop still continues. Microsoft is still taking the view that "Web integration" should be the future of Windows. And they are still trying to sell that view to their customers. Active Desktop, Passport, Hailstorm and Windows Live were all failed attempts to expand Windows into this new role of being integrated, in some vague way, with the Internet; to cash in on the Internet by making Windows into the mediator between PC users and online, commercial services.

   In light of those past "Web integration" projects, the security changes since XP SP2, extended in Vista/7, reveal an interesting strategy....

Consider:
   For most people Internet Explorer is the way that they access the Internet. With XP SP2 their own local Desktop was put into roughly the IE Restricted Zone, while Internet Zone security has been tightened and Internet Explorer itself has been further defined as a core Windows service. When files are downloaded with IE into this new high-security Desktop they are now marked with their original source URL. (When possible. That function requires that XP be installed with the NTFS file system. See the Stream Viewer page for a utility to deal with the problem. Also see above, Fixing XP SP2 "security improvement" Nags.)
   Thus marked, those downloaded files are permanently treated as security risks, no matter how many times they are opened! When those files are opened, they are opened in accordance with the security rating of the source URL, as though the file were actually still online.

   This is a very odd state of affairs, but it begins to make more sense in view of Microsoft's Web integration strategy: Through a few minor "security" changes Microsoft may have greatly advanced their gradual move toward reinventing the PC as a web-services appliance.
   By redefining the Desktop as a high-risk Internet security zone, and redefining Internet Explorer as not just a browser but also a system security guard that monitors file usage both on- and off-line, Microsoft achieves a new kind of illusion of Web integration. This time, instead of the Web coming to the Desktop (Active Desktop), the Desktop is dumped onto the Web. (In neither case has anything really changed, but a specific "user experience" is suggested, particularly to the new Windows user.) The impression of Web integration is strengthened by treating downloaded files as if they were still on the Internet (and therefore subject to Internet-level security), even years after downloading and opening them. In addition, web integration is implied by the design of the Windows interface. For instance, "Find" was renamed to "Search" and has looked increasingly like a webpage search window in each successive version of Windows. (Ironically, starting with XP, Windows Search has trouble even finding things in Windows, much less online. Getting a usable Find utility on XP+ requires installing a 3rd-party program like Agent Ransack.) The Up arrow button on folder windows was removed as part of a redesign to make folder windows look more like Internet Explorer. And a feature was added to Windows 7 that allows "pinning" a URL to the Quick Launch toolbar along the bottom of the screen. (That's a silly feature, and actually it's always been there. Windows 7 just made it more difficult to use. But that hasn't stopped online pundits from singing the praises the brilliant new URL pinning option.)

   Taken together, these changes send a message to people using Windows PCs that says:

1) "You are always online."

2) "The online world is not an information superhighway. It is primarily a world of commercial services."

3) "The online world can be dangerous. For your safety, it is best to constrain your online activities to purchasing reputable retail products."
   Phew! Thank goodness that we can do our shopping safely at the Microsoft Live.com Shopping Mall.

Back to Top

An Internet Explorer Option: Radical Control Over the Browser

Go to jsPageFilter page.    Despite all the problems with Internet Explorer, some people prefer IE to other browsers, and other people don't have a choice. As was explained to some extent above, controlling security and privacy in IE is very difficult. But there are ways to use IE bugs and problems to advantage: jsPageFilter is a free IE plug-in that allows you to control the webpages that IE loads. You can filter webpages before IE gets them, on a per-domain basis. In other words, you can disable script at one site while allowing it at another. You can block 3rd-party images. You can convert webpages to plain text. That kind of control has always been available, to some extent, in other browsers, but not in IE. Or rather, that kind of control has been hidden in IE. jsPageFilter actually takes advantage of IE shortcomings to give you greater control in IE than any other browser provides.

Go to the jsPageFilter page for a full explanation and download.

Back to Top

UserAgent Settings - A Bit of Useless Fun

   This section covers a tangential topic that may be of interest to some people. userAgent is a text string that your browser sends to websites that you visit. It identifies your browser, operating system, and sometimes includes other information. While the userAgent can be easily changed with most browsers, changing it is not so easy in Internet Explorer.

   If you have script enabled in Internet Explorer, your userAgent should be displayed here:



   The userAgent or "userAgent string" is a string of text that the browser sends to the server when requesting a webpage. The UA string includes the browser model and version. It can sometimes also include other information. For the most part the UA string is harmless. It just helps the server to give you the right webpage. But you can change the UA string if you want to pretend to be using another browser for some reason. In the case of Internet Explorer, you might also want to just clean up the UA string for the sake of privacy and security. Microsoft, and some other companies, have got carried away adding information to the userAgent string and you may not want to share some of that information. (Note, though, that if you pretend to be using, say, Opera when you are really using IE then many websites, including this one, will not function properly.)

The typical UA string should read something like these two examples, for IE5 on Windows 2000 and Firefox 1 on Windows XP:

Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)
Mozilla/5.0 (Windows; U; Windows NT 5.1) Gecko/20050915 Firefox/1.0.7

Those UA strings are pretty much self-explanatory. Now look at these two UA string:

Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Maxthon; .NET CLR 1.1.4322; InfoPath.1; .NET CLR 2.0.50727)
Mozilla/4.0 (compatible; MSIE 6.0; AOL 9.0; Windows NT 5.1; SV1; FunWebProducts; (R1 1.5); .NET CLR 1.1.4322)

   The first UA string above says that the client is using IE6 on Windows XP ("NT 5.1"), with Service Pack 2 ("SV1"). They are using IE6 with the Maxthon IE skin program, MS Infopath, and they also have the .Net v. 1.1 and v. 2 runtimes installed.
   The second UA string is someone using Windows XP SP2, with IE6, probably running through AOL. They have the .Net v. 1.1 runtime installed and have picked up some other hangers-on: something named "FunWebProducts" (probably some sort of adware) and something mysteriously named "R1".

Changing the IE userAgent string:

   The first part of the UA string - "Mozilla 4/0" - is used for all versions of IE and for Netscape 4. Mozilla browsers use "Mozilla 5/0". Opera just uses "Opera". There seems to be no way to change "Mozilla 4/0" in the IE UA string.

   The rest of the IE UA string is in parentheses, in the following format:
(compatible; Version; Pre-platform info ; Platform (OS); Post-platform info)
Example: (compatible; MSIE 6.0; Harry's Adware; Windows NT 5.1; Maxthon)

Those parts of the UA string correspond to Registry settings. These settings are under:
   Software\Microsoft\Windows\CurrentVersion\Internet Settings\
For thoroughness, the values should be set (or removed) in both:
   HKEY_LOCAL_MACHINE
and
   HKEY_CURRENT_USER
to make sure that a different setting is not overriding the ones you have entered.

In Windows XP, some sources also recommend settings under the following keys, although it appears to be specific to 64-bit Windows and is not mentioned in the official Microsoft documentation that comes with their official "IE User Agent String Utility". (The official IE UA String Utility is a UA string adjuster, which comes packaged in a very official MSI installer, but all it will do is to toggle the version of IE in Windows XP between IE6 and IE7 for testing purposes.)
   HKEY_LOCAL_MACHINE,
   SOFTWARE\Wow6432Node\Microsoft\
     Windows\CurrentVersion\Internet Settings\


The following Registry values demonstrate how to create this UA string:
Mozilla/4.0 (:-); MSIE 18.0; Finally No Bugs; Okey Dokey; Windows 2029; What a treat!)

Under the key:
Software\Microsoft\Windows\CurrentVersion\Internet Settings\
as detailed above, should be the following keys and values:

Key: 5.0\User Agent
   Value: "Version" Data: "MSIE 18.0"
   Value: "Platform" Data: "Windows 2029"
   Value: "Compatible" Data: ":-)"

Key: User Agent\Pre Platform
   Value: "Okey Dokey" Data: ""
   Value: "Finally No Bugs" Data: ""

Key: User Agent\Post Platform
   Value: "What a treat!" Data: ""

   Anyone familiar with the Registry will be able to figure out how to clean or edit their IE UA string from that information. To test your UA string changes, save the following text as a text file, name it with an "html" extension, and open it in IE:

<HTML> <HEAD> </HEAD> <BODY>
<SCRIPT LANGUAGE="VBScript">
document.write(navigator.userAgent)
</SCRIPT>
</BODY> </HTML>
Back to Top