Internet Explorer  security settings

Posted on 2004-11-09
Last Modified: 2013-12-04
Morning, A client of mine is running win98 and is having web mail problems. When he opens his web mail, Internet Explorer informs him that his security settings are the reason he can’t download anything, however when I looked into it, everything looks fine. Any ideas?  Thanks
Question by:ibhangen
    LVL 6

    Accepted Solution

    Good morning ibhangen,  =]

    Sounds like IE might be setup a littel funny, lets run through some procedures to generalize things.

    Open Internet Explorer, click on; Tools >> Internet Options:

    Clear Cache:
    Under the General tab, click “Delete Files…” then check the box that says “Delete all offline content.” Now click OK.

    Security Settings:
    Under Security tab, click on each of the 4 icons (My Computer, Local Intranet, Trusted Sites, Restricted Sites). Click “Default Level” for each one. Once the settings are all set to default, click on TRUSTED SITES, then click the "Sites..." button. Now type in the webmail site(ex. un tick "Require server verification (https:)...." at the bottom. click "add" then "ok", now "apply."

    Advanced Settings:
    Under Advanced tab, click on “Restore Defaults” button. Now scroll up a little and uncheck ‘enable third party browser extensions.’

    If that does work I would run a scan for spyware/adware/malware to assure yourself its not a factor in this issue.
    AD-AWARE - : be sure to run the update before running the scan.

    Keep me posted, that should do the trick!

    Good Luck,


    Author Comment

    Thanks Jorden, have a great day

    Ken K.
    Systems Specialist

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Article by: btan
    The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
    Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now