`
`. ~ .. -:::::
`·:::~a~
`... ,.,,
`"
`Microsoft•
`Windows NT."
`Windows"98
`
`CD-ROM
`Included
`
`1nt:rnet
`Explorer5
`Resource
`Kit
`
`Comprehensive technical
`information and tools for deploying
`and supporting Internet Explorer
`in your organization
`
`Petitioner Apple - Ex. 1066, p. 1
`
`
`
`Microsoft
`
`Internet
`Explorer 5
`· Resource Kit
`
`Petitioner Apple - Ex. 1066, p. 2
`
`
`
`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright© 1999 by Microsoft Corporation
`
`All rights reserved. No part of the. contents of this book may be reproduced or transmitted in any form or
`by any means without the written permission of the publisher.
`·
`·
`
`Library of Congress Cataloging-in-Publication Data
`Microsoft Internet Explorer 5 Resource Kit I Microsoft Corporation.
`p. em.
`Includes index.
`ISBN 0-7356-0587-4
`1. Microsoft Windows Internet Explorer. 2. Internet (Computer network)
`4. Browsers
`3. World Wide Web (information retrieval system)
`I. Microsoft Corporation.
`(Computer programs)
`TK5105.888.M54 1998
`005.7'13769--dc21
`
`98-31160
`. CIP
`
`Printed and bound in the United States of America.
`1 2 3 4 5 6.7 8 9 wcwc
`
`4 3 2 1 0 9
`
`Distributed in Canada by ITP Nelson, a division of Thomson Canada Limited.
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa(cid:173)
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at mspress.microsoft.com.
`
`Macintosh, QuickTime, and TrueType are registered trademarks of Apple Computer, Inc. Intel is a
`registered trademark of Intel Corporation. Active Accessibility, Active Channel, Active Desktop,
`ActiveMovie, ActiveX, Authenticode, BackOffice, DirectAnimation, DirectShow, SirectSound, DirectX,
`DriveSpace, FrontPage, Hotmail, JScript, Microsoft, Microsoft Internet Explorer logo, Microsoft Press,
`MSDN, MS-DOS, MSN, NetMeeting, Outlook, PowerPoint, Visual Basic, Visual C++, Visual InterDev,
`WebBot, Win32, Windows, Windows logo, Windows NT, and Windows Start logo are either registered
`trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other
`product and company names mentioned herein may be the trademarks of their respective owners.
`
`The example companies, organizations, products, people, and events depicted herein are fictitious.
`No association with any real company; organization, product, person, or event is intended or should
`be inferred.
`
`Acquisitions Editor: Juliana Aldous
`Project Editor: Maureen Williams Zimmerman
`
`Petitioner Apple - Ex. 1066, p. 3
`
`
`
`CHAPTER 8
`
`Content Ratings and User Privacy
`
`143
`
`Using the content rating and user privacy features of Microsoft Internet
`Explorer 5, you can create a secure environment that protects users from
`inappropriate Web content and ensures the privacy of their information.
`This chapter des.cribes these features and explains how you can configure
`rating and privacy ~ettings.
`
`In This Chapter
`Using Content Ratings 144
`RSACi Rating System 144
`Other Rating Systems 145
`Supervisor Password 146
`Configuring Content Advisor Settings 146
`Ensuring User Privacy 152
`Secure Communications 152
`Zone-Based Password Security Protection 152
`Control Over Cookies 153
`Profile Assistant 153
`Microsoft Wallet 3.0 154
`Configuring Privacy Options 155
`Configuring Profile Assistant 156
`Configuring Microsoft Wallet 3.0 157
`Configuring Advanced Security Options for User Privacy 160
`
`See Also
`• For more information about managing your list of trusted digital certificates,
`see Chapter 6, "Digital Certificates."
`• For more information about configuring security zones and Java custom
`security, see Chapter 7, "Security Zones and Permission-Based Security
`for Microsoft Virtual Machine."
`
`Petitioner Apple - Ex. 1066, p. 4
`
`
`
`144
`
`Part 1 Getting Started
`
`• For more information about using the Internet Explorer Customization wizard
`to preconfigure security settings, see Chapter 15, "Running the Internet
`Explorer Customization Wizard."
`• For more information about using the Internet Explorer Administration Kit
`(lEAK) Profile Manager to preconfigure security settings, see Chapter 22,
`"Keeping Programs Updated."
`
`Using Content Ratings
`
`Using the Internet Explorer Content Advisor, you can control the types of content
`that users access on the Internet. You can adjust the content rating settings to
`reflect the appropriate level of content in four areas: language, nudity, sex, and
`violence. For example, businesses might want to block access to sites that offer no
`business value to their employees, and parents might want to block access to sites
`that display inappropriate content for their children.
`
`Historically, the motive for filtering sites on the basis of a site's content has been
`driven by a site's subject matter and the fact that some ideas and images are
`blatantly offensive to many people. In 1995, the World Wide Web Consortium
`(W3C) Platform for Internet Content Selection (PICS) began to define an
`infrastructure that would encourage Web content providers to voluntarily rate
`their sites. This is done by using a specific set of HTML meta tags that rate the
`content of Web sites. Software programs can then block access to Web sites based
`upon the values of those meta tags. Today, the most common content ratings are
`based on the PICS standard for defining and rating Web content. For more
`information about PICS, visit the W3C Web site.
`
`RSACi Rating System
`Internet Explorer is installed with a PICS-based content rating system known
`as the Recreational Software Advisory Council on the Internet (RSACi) system.
`This built-in PICS support can help you control the types of content that users can
`access on the Internet. When you enable Content Advisor, Internet Explorer reads
`the meta tags to determine whether Web sites meet your criteria for suitable
`content. You can also subscribe to independent ratings bureaus or use third-party
`ratings to control access to Web content.
`
`RSACi is an open, objective, content ratings system for the Internet developed by
`the Recreational Software Advisory Council (RSAC), an independent, nonprofit
`organization. The RSACi system provides information about the level of sex,
`nudity, violence, and offensive language (vulgar or hate-motivated) in software
`games and Web sites. For more information about RSAC and the RSACi rating
`system, see the RSAC Web site.
`
`Petitioner Apple - Ex. 1066, p. 5
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`145
`
`The following table shows the five levels of the RSACi rating system and
`describes the content allowed for each level. Level 0 is the most restrictive,
`and Level 4 the least restrictive.
`
`Level
`
`Violence rating
`
`Nudity rating
`
`Sex rating
`
`Language rating
`
`4
`
`3
`
`2
`
`1
`
`0
`
`Rape or wanton,
`gratuitous violence
`
`Aggressive violence
`or death of humans
`Destruction of
`realistic objects
`Injury to a human
`being
`None of the above
`
`Frontal nudity
`qualifying as
`provocative
`Frontal nudity
`
`Partial nudity
`
`Revealing attire
`
`None of the above
`
`Explicit sexual acts
`or sex crimes
`
`Non-explicit sexual
`acts
`Clothed sexual
`touching
`Passionate kissing
`
`None of the above
`or innocent kissing;
`romance
`
`Crude, vulgar
`language, or extreme
`hate speech
`Strong language
`or hate speech
`Moderate expletives
`or profanity
`Mild expletives
`
`None of the above
`
`You can set content ratings to any level for each of the four content areas. All
`content ratings are set to Level 0 by default. When Content Advisor is turned on
`and the PICS rating for a Web site exceeds the rating level you specify, Internet
`Explorer prevents users from accessing the site. Also, you can configure Internet
`Explorer to prevent or allow users to access unrated Web content. For more
`information, see "Configuring Content Advisor Settings" later in this chapter.
`
`Web site publishers can obtain PICS content ratings from RSAC, as well as from
`a number of other nonprofit and fee-based ratings services. Publishers can
`voluntarily add PICS ratings to their Web sites. You can also obtain independent
`PICS ratings from ratings bureaus. Ratings bureaus are typically fee-based and
`specialize in rating Internet sites. You can specify a ratings bureau other than
`RSAC that Internet Explorer can use to obtain PICS ratings. Because Internet
`Explorer must contact the ratings bureau to obtain the ratings, using other ratings
`bureaus can slow access to Web pages considerably.
`
`Other Rating Systems
`Some Web publishers rate their sites using rating systems that are not based on
`PICS. To use these rating systems, you must subscribe to ratings services that
`support the non-PICS rating systems and then import the rating systems so that
`Internet Explorer can use them to rate Web content. For more information, visit
`the Web sites of the rating services. You can also review "Configuring Content
`Advisor Settings" later in this chapter to learn how to specify different rating
`systems for Internet Explorer.
`
`Petitioner Apple - Ex. 1066, p. 6
`
`
`
`146
`
`Part 1 Getting Started
`
`Supervisor Password
`The first time you tum on Content Advisor, you must specify a supervisor
`password. This password allows administrators or supervisors to tum Content
`Advisor on or off and to change Content Advisor settings for users.
`
`In addition, you can configure Internet Explorer so that users can display
`restricted Web pages by typing the supervisor password. When users attempt to
`access restricted content, the Content Advisor dialog box prompts users to enter
`the supervisor password. For more information, see the next section.
`
`Configuring Content Advisor Settings
`
`You can configure Content Advisor settings in several ways:
`
`•
`
`In Internet Explorer, click the Tools menu, click Internet Options, and then
`click the Content tab.
`• You can use the Internet Explorer Customization wizard to create custom
`packages of Internet Explorer that include preconfigured Content Advisor
`settings for your user groups. You can also lock down these settings to
`prevent users from changing them.
`• After Internet Explorer is deployed, you can use the lEAK Profile Manager to
`update Content Advisor settings through the automatic browser configuration
`feature of Internet Explorer. You can automatically push the updated security
`zone settings to each user's desktop computer, enabling you to manage
`security policy dynamically across all computers on the network.
`
`You can accept the default Content Advisor settings, or you can configure the
`settings based on the needs of your organization and its users. The options for
`configuring Content Advisor are the same whether you access them from Internet
`Explorer 5, the Internet Explorer Customization wizard, or the lEAK Profile
`Manager. For more information about using the Internet Explorer Customization
`wizard and lEAK Profile Manager, see Chapter 15, "Running the Internet
`Explorer Customization Wizard," and Chapter 22, "Keeping Programs Updated."
`
`After you enable Content Advisor, you can use it to do the following:
`
`• Select content rating levels.
`• Configure the list of approved and disapproved Web sites.
`• Configure user options for content ratings.
`• Change the supervisor password.
`•
`Import new rating systems.
`• Specify a different ratings bureau.
`
`I A
`
`Petitioner Apple - Ex. 1066, p. 7
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`147
`
`~ To enable Content Advisor
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Enable.
`3. Type the password you want to use.
`The following illustration shows the Create Supervisor Password dialog box.
`
`4. In the Confirm password box, type the same password again.
`
`~ To select content rating levels
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the Ratings tab.
`3. Select the Language, Nudity, Sex, or Violence ratings category.
`The following illustration shows the ratings categories for Content Advisor.
`
`Petitioner Apple - Ex. 1066, p. 8
`
`
`
`148
`
`Part 1 Getting Started
`
`4. Drag the slider to the appropriate content level for the selected category.
`The default setting for each category is Level 0, which is the most restrictive
`setting. For more information about ratings levels, see "RSACi Rating
`System" earlier in this chapter.
`
`ll> To configure the list of approved and disapproved Web sites
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the Approved
`Sites tab.
`The following illustration shows the Approved Sites tab for Content Advisor.
`
`3. Type the URL for each Web site that your users can view regardless of its
`rating level, and then click Always.
`4. Type the URL for each Web site that your users can never view regardless of
`its rating level, and then click Never.
`
`Note If you want to delete an approved or disapproved Web site, click the
`URL in the list, and then click Remove.
`
`Petitioner Apple - Ex. 1066, p. 9
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`149
`
`~ To configure user options for content ratings
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the General tab.
`3. In the User Options area, select the settings you want.
`The following illustration shows the User Options area for Content Advisor.
`
`Option
`
`Description
`
`Users can see sites that
`have no rating
`Supervisor can type
`a password to allow
`users to view restricted
`content
`
`Select or clear this option depending on whether you want
`users to access Web pages that are not rated.
`Select or clear this option depending on whether you
`want users to view restricted content by typing the
`supervisor password.
`
`~ To change the supervisor password
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the General tab.
`3. Click Change Password.
`
`Petitioner Apple - Ex. 1066, p. 10
`
`
`
`150
`
`Part 1 Getting Started
`
`The following illustration shows the Change Supervisor Password dialog box.
`
`4. In the Old password box, type the current password to verify that you are
`authorized to change Content Advisor settings.
`5. In the New password box, type the new password.
`6. In the Confirm new password box, type the new password again.
`
`~ To import new rating systems
`
`Important If necessary, install rating systems files following the directions
`provided by the ratings service. Then proceed with the following steps.
`
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the General tab.
`3. Click Rating Systems.
`·The following illustration shows the Rating Systems dialog box.
`
`4. If the rating system you want to add is displayed on the list, click it, and then
`click Add.
`If the rating system you want to add is not on the list, click OK, and then click
`Find Rating Systems.
`
`Petitioner Apple - Ex. 1066, p. 11
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`151
`
`~ To specify a different ratings bureau
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. In the Content Advisor area, click Settings, and then click the Advanced tab.
`The following illustration shows the Advanced tab for Content Advisor.
`
`3. In the Ratings bureau box, type the name ofthe ratings bureau (other than
`RSAC) that Internet Explorer can use to obtain PICS ratings.
`4. In the PICSRules area, click Import, and then type the name of the PICSRules
`(.prf) file used by the new ratings bureau.
`
`Petitioner Apple - Ex. 1066, p. 12
`
`
`
`152
`
`Part 1 Getting Started
`
`Ensuring User Privacy
`
`When you communicate over the Web, you want to know that other people cannot
`intercept or decipher the information you send and receive and cannot use your
`passwords and other private information. You also want to ensure that no one can
`access information on your computer without your knowledge. Internet Explorer
`protects your privacy in the following ways:
`
`•
`
`•
`
`It supports a wide range of Internet security and privacy standards that provide
`secure information transfer and financial transactions over the Internet or
`intranet.
`It provides encryption and identification capabilities to help users ensure the
`privacy of their information on the Web.
`
`Secure Communications
`Internet Explorer supports the latest Internet security standards, including
`Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Private
`Communications Technology (PCT). Internet Explorer uses these protocols to
`create a secure channel for information exchange over the Web. In addition,
`Internet Explorer supports Fortezza security technology through the Fortezza
`Cryptographic Service Provider (CSP) plug-in. Users with Fortezza Crypto
`Cards can install the Fortezza CSP plug-in to ensure secure Internet Explorer
`communications based on Fortezza security standards.
`
`When you browse a Web site that supports SSL, TLS, PCT, or Fortezza, Internet
`Explorer displays a lock icon in the browser's status bar at the bottom of your
`computer screen; in Fortezza mode, an "F" is overlaid on the lock icon. When you
`see this lock, you know that you can safely send information over the Internet to
`the site you are browsing.
`
`For more information about Internet Explorer support for SSL, TLS, PCT, and
`Fortezza, see Chapter 6, "Digital Certificates."
`
`Zone-Based Password Security Protection
`Internet Explorer prompts you before transmitting your user name or password
`to sites that are designated as trusted in the security zones settings. You can,
`however, also configure security zones to send information from trusted sites
`without prompting you. For more information about configuring security zones,
`see Chapter 7, "Security Zones and Permission-Based Security for Microsoft
`Virtual Machine."
`
`Petitioner Apple - Ex. 1066, p. 13
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`153
`
`Control Over Cookies
`An HTTP cookie is a small file that an individual Web site stores on your
`computer to provide customization features. For example, when you implement
`custom settings for MSN, that information is stored in a cookie file on your
`computer. MSN then reads the cookie each time you visit the site and displays
`the options you selected.
`
`You can configure Internet Explorer to handle cookies in the following ways:
`
`• Prevent cookies from being stored on your computer.
`• Prompt you about whether to accept cookies from the site.
`• Allow cookies to be stored on your computer without notifying you.
`
`For more information, see Chapter 7, "Security Zones and Permission-Based
`Security for Microsoft Virtual Machine."
`
`Note Accepting a cookie does not give a Web site access to your computer or
`any personal information about you other than what you have specified in the
`customized settings for that site.
`
`Profile Assistant
`You can use Profile Assistant to securely share registration and demographic
`information with Web sites while maintaining your computer's privacy and safety.
`Profile Assistant supports the Internet privacy model defined by the Platform for
`Privacy Preferences (P3), a W3C project. You can maintain your personal
`information in a user profile, which provides a secure, encrypted information
`store on your computer.
`
`A Web site can request information from your profile, but the Web site is not
`allowed to access profile information unless you specifically give your consent.
`Because Profile Assistant complies with the Internet's P3 privacy standards, it
`can also work with other Internet programs and servers.
`
`For information about how to write scripts to access Profile Assistant information,
`see the Microsoft Internet Client Software Development Kit, which is part of the
`MSDN Online Web site.
`
`When a Web site requests information from your user profile, the Profile
`Assistant dialog box opens. You can use the information in the Profile Assistant
`dialog box to verify which Web site is making the request, choose which
`information (if any) to share, and understand how the Web site intends to use
`the information.
`
`Petitioner Apple - Ex. 1066, p. 14
`
`
`
`154
`
`Part 1 Getting Started
`
`The following table describes the information displayed in the Profile Assistant
`dialog box.
`
`Option
`
`Description
`
`'Requester name' has
`requested information
`from you
`Site
`
`Profile information
`requested
`
`Always allow this site
`to see checked items
`Edit profile
`
`Privacy
`
`Displays the name of the requester, which can be an individual
`or an organization.
`
`Displays the URL of the site requesting inform~tion from the
`user profile.
`Displays the list of information items requested. Clear the
`check boxes for any items you do not want to send to the
`requester.
`Adds this site to a list of sites that you allow to access your
`user profile without notifying you.
`Opens the My Profile dialog box so you can edit the profile
`information that will be sent to this Web site. For example,
`you might want to send a different fax number.
`Displays a message that explains whether the information you
`are sharing will be secure when it is sent over the Internet. It
`also displays a message describing how the requester intends
`to use the information.
`
`Web sites can request up to 31 different items of information from your
`user profile. For more information, see "Configuring Profile Assistant" later
`in this chapter.
`
`Microsoft Wallet 3.0
`Microsoft Wallet 3.0 is a software payment program that you can use to conduct
`secure financial transactions over the Web with sites that support Wallet. You can
`use Wallet to securely store private information, such as credit card account data,
`for making payments over the Internet. Your private information is encrypted and
`stored in a protected storage area. You can decide what private information to put
`in Microsoft Wallet and who gets to view and use that information.
`
`Note Wallet requires the Windows Address Book (WAB), which is included in
`the standard installation, but not the minimum installation, of Internet Explorer.
`If users attempt to start Wallet without the W AB, Internet Explorer can download
`this component using the Automatic Install feature.
`
`Petitioner Apple - Ex. 1066, p. 15
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`155
`
`Wallet supports all industry-standard payment methods, including SSL and Secure
`Electronic Transaction (SET), which enable the secure electronic use of credit
`cards. Wallet also supports add-on payment methods, such as digital cash and
`electronic checks, which some merchants and financial institutions might require.
`For instructions about how to install and use add-ons, contact the appropriate
`merchant or financial institution.
`
`Wallet stores address and payment information separately. In the Addresses
`dialog box, you can enter, store, and access addresses that you want to reference
`for shipping and billing during online order entry. You can also view names,
`e-mail addresses, and telephone numbers of Wallet users in the Address Book.
`
`In the Payments dialog box, you can enter, securely store, and access various
`types of payment methods for making online purchases. This information is
`protected by a password that you define. When you shop at an Internet store that
`supports Wallet, the site can prompt you to select payment methods stored in
`Wallet and to authorizepayment by typing your password.
`
`For more information, see "Configuring Microsoft Wallet 3.0" later
`in this chapter.
`
`Configuring Privacy Options
`
`To configure Internet Explorer privacy options, click the Tools menu, click
`Internet Options, and then click the Content and Advanced tabs. From these
`dialog boxes you can do the following:
`
`• Configure Profile Assistant.
`• Configure Microsoft Wallet 3.0.
`• Configure advanced security options for user privacy.
`
`Petitioner Apple - Ex. 1066, p. 16
`
`
`
`156
`
`Part 1 Getting Started
`
`Configuring Profile Assistant
`You can use Profile Assistant to store or update the information you want to share
`with Web sites. Profile Assistant is used by other Internet programs, including
`NetMeeting and Outlook Express .
`
`.,.. To create or update a user profile
`1. On the Tools menu, click Internet Options, and then click the Content tab ..
`2. Click My Profile.
`The following illustration shows the summary of profile properties.
`
`3. In the appropriate boxes on the Personal, Home, Business, and Other tabs,
`type the information you want to share.
`
`_j .
`
`Petitioner Apple - Ex. 1066, p. 17
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`157
`
`Configuring Microsoft Wallet 3.0
`You can use Microsoft Wallet 3.0 to store the information you want to use for
`payments over the Internet.
`
`~ To add or update addresses used for payments
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. Click Wallet, and then click Addresses.
`The following illustration shows the Addresses tab for Microsoft Wallet.
`
`3. To add a new address, click Add.
`To update an existing address, click Edit.
`
`Petitioner Apple - Ex. 1066, p. 18
`
`
`
`158
`
`Part 1 Getting Started
`
`The following illustration shows the Add a New Address dialog box.
`
`4. Type the name and address information, or click Address Book to select
`an existing address from the Address Book.
`5. In the Display name box, type a display name for this address.
`6. Click Home or Business depending on the type of address.
`
`Petitioner Apple - Ex. 1066, p. 19
`
`
`
`Chapter 8 Content Ratings and User Privacy
`
`159
`
`~ To add or update personal credit card information
`1. On the Tools menu, click Internet Options, and then click the Content tab.
`2. Click Wallet, and then click Payments.
`The following illustration shows the Payments tab for Microsoft Wallet.
`
`3. To add a credit card to the list of payment options, click Add.
`To update existing credit card information, click Edit.
`4. Click the credit card you want to add or update, and then follow the
`instructions on your screen.
`You must provide your credit card account information and a password. You
`will need to enter this password before you can use the credit card to make a
`payment or edit the credit card information. This password ensures that other
`people cannot make purchases on the Internet using your credit card
`information. Internet Explorer encrypts and stores this information in the
`protected storage area in Wallet.
`
`Petitioner Apple - Ex. 1066, p. 20
`
`
`
`160
`
`Part 1 Getting Started
`
`Configuring Advanced Security Options for User Privacy
`You can configure a variety of user-privacy security options for Internet Explorer.
`
`~ To configure advanced security options for user privacy
`1. On the Tools menu, click Internet Options, and then click the Advanced tab.
`2. In the Security area, review the options that are selected.
`The following illustration shows the Security options on the Advanced tab.
`
`Do not search from the Address bar
`0 Just display the results in the main window
`0 Just go to the most likely site
`Security
`D Check for publisher's certificate revocation
`0 Check for server certificate revocation (requires restart)
`D Do not save encrypted pages to disk
`D Empty Temporary Internet Files folder when browser is closed
`1i1J Enable Profile Assistant
`D Use Fortezza
`li1] Use PCT 1.0
`Use SSL2.0
`
`Warn about invalid site certificates
`
`3. Depending on your needs, select or clear the Security check boxes.
`For example, if you want to enable Profile Assistant, select the Enable
`Profile Assistant check box.
`
`Petitioner Apple - Ex. 1066, p. 21