Microsoft Office Tutorials and References
In Depth Information
Summary
File and folder permissions can be very useful. If you have a program on your
computer that you do not want anyone else running, simply set the permissions
on that folder so that only you can read and execute the program.
Summary
Throughout this chapter you found out how to increase your privacy when
using Internet Explorer. The information that Internet Explorer leaves behind
can be very sensitive, so I showed you how to clear your history and delete
temporary files to protect your privacy. Then, I showed you how to configure
Internet Explorer so it cleans up after itself when you close the browser.
The second part of this chapter addressed the privacy concerns of the
Windows interface. Just like Internet Explorer, Windows records many of your
computer activities. Clearing those records is an essential part of protecting your
privacy. First, I showed you how to remove sensitive items that may appear in
Jump Lists on the taskbar, and then you learned ways to further protect your
privacy with file permissions.
You have now finished reading the last chapter of Windows 8 Tweaks . In Part I, I
guided you through selecting the right version of Windows 8 and then installing
it, along with basic tips to tweak your computer safely. In Part II, I showed you
how to customize just about everything that can be customized in Windows 8
to make Windows appear that it was designed just for you. In Part III, the focus
turned to performance, and I covered tweaks that can help speed up Windows 8
on any computer by optimizing the various aspects of the operating system.
In Part IV, the topic moved on to securing your computer. I showed you how
to protect your computer from attackers, defend against spyware and viruses,
and protect your privacy.
Now that you have completed the final chapter, your Windows 8 experience
has been fully personalized, optimized, and secured.
 
Search JabSto ::




Custom Search