K-Flakes # 2010-3 : Determine zone setting and restriction in Internet Explorer (IE) through programming



Determine zone setting and restriction in Internet Explorer (IE) through programming


The Zone settings are saved in the registry. You can write a local program to read/write the settings from registry. The same can also be done via javascript; but for that the IE security settings should be low enough to allow you the same.


Following is the key, where setting for specific zone is saved.


HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\


Where is defined as


Value  Setting
------------------------------
 0    My Computer
 1    Local Intranet Zone
 2    Trusted sites Zone
 3    Internet Zone
 4    Restricted Sites Zone
-------------------------------


If you wish to determine, whether a particular setting is enabled or not in a zone; then you can look for the value for the following keys in the respective zone section:


Value  Setting
----------------------------------------------------------------------------------
 1001   ActiveX controls and plug-ins: Download signed ActiveX controls


 1004   ActiveX controls and plug-ins: Download unsigned ActiveX controls


 1200   ActiveX controls and plug-ins: Run ActiveX controls and plug-ins


 1201   ActiveX controls and plug-ins: Initialize and script ActiveX controls not marked as safe for scripting


 1206   Miscellaneous: Allow scripting of Internet Explorer Web browser control ^


 1207   Reserved #


 1208   ActiveX controls and plug-ins: Allow previously unused ActiveX controls to run without prompt ^


 1209   ActiveX controls and plug-ins: Allow Scriptlets


 120A   ActiveX controls and plug-ins: ActiveX controls and plug-ins: Override Per-Site (domain-based) ActiveX restrictions


 120B   ActiveX controls and plug-ins: Override Per-Site (domain-based) ActiveX restrictions


 1400   Scripting: Active scripting


 1402   Scripting: Scripting of Java applets


 1405   ActiveX controls and plug-ins: Script ActiveX controls marked as safe for scripting


 1406   Miscellaneous: Access data sources across domains


 1407   Scripting: Allow Programmatic clipboard access


 1408   Reserved #


 1601   Miscellaneous: Submit non-encrypted form data


 1604   Downloads: Font download


 1605   Run Java #
 1606   Miscellaneous: Userdata persistence ^


 1607   Miscellaneous: Navigate sub-frames across different domains


 1608   Miscellaneous: Allow META REFRESH * ^




 1609   Miscellaneous: Display mixed content *


 160A   Miscellaneous: Include local directory path when uploading files to a server 


 1800   Miscellaneous: Installation of desktop items


 1802   Miscellaneous: Drag and drop or copy and paste files


 1803   Downloads: File Download ^


 1804   Miscellaneous: Launching programs and files in an IFRAME




 1805   Launching programs and files in webview #


 1806   Miscellaneous: Launching applications and unsafe files


 1807   Reserved ** #


 1808   Reserved ** #




 1809   Miscellaneous: Use Pop-up Blocker ** ^
 180A   Reserved # 


 180B   Reserved #


 180C   Reserved #


 180D   Reserved #
 1A00   User Authentication: Logon


 1A02   Allow persistent cookies that are stored on your computer #


 1A03   Allow per-session cookies (not stored) #


 1A04   Miscellaneous: Don't prompt for client certificate selection when no certificates or only one certificate exists * ^


 1A05   Allow 3rd party persistent cookies *


 1A06   Allow 3rd party session cookies *


 1A10   Privacy Settings *


 1C00   Java permissions #


 1E05   Miscellaneous: Software channel permissions




 1F00   Reserved ** #




 2000   ActiveX controls and plug-ins: Binary and script behaviors


 2001   .NET Framework-reliant components: Run components signed with Authenticode


 2004   .NET Framework-reliant components: Run components not signed with Authenticode


 2100   Miscellaneous: Open files based on content, not file extension ** ^


 2101   Miscellaneous: Web sites in less privileged web content zone can navigate into this zone **


 2102   Miscellaneous: Allow script initiated windows without size or position constraints ** ^


 2103   Scripting: Allow status bar updates via script ^


 2104   Miscellaneous: Allow websites to open windows without address or status bars ^


 2105   Scripting: Allow websites to prompt for information using scripted windows ^




 2200   Downloads: Automatic prompting for file downloads ** ^


 2201   ActiveX controls and plug-ins: Automatic prompting for ActiveX controls ** ^


 2300   Miscellaneous: Allow web pages to use restricted protocols for active content **


 2301   Miscellaneous: Use Phishing Filter ^


 2400   .NET Framework: XAML browser applications


 2401   .NET Framework: XPS documents


 2402   .NET Framework: Loose XAML


 2500   Turn on Protected Mode [Vista only setting] #


 2600   Enable .NET Framework setup ^



 {AEBA21FA-782A-4A90-978D-B72164C80120} First Party Cookie *


 {A8A88C49-5EB2-4990-A1A2-0876022C854F} Third Party Cookie *

*  indicates an Internet Explorer 6 or later setting
** indicates a Windows XP Service Pack 2 or later setting
#  indicates a setting that is not displayed in the user interface in Internet Explorer 7
^  indicates a setting that only has two options, enabled or disabled

Notes about 1200, 1A00, 1A10, 1E05, 1C00, and 2000


The following two registry entries affect whether you can run ActiveX controls in a particular zone:
1200 This registry entry affects whether you can run ActiveX controls or plug-ins.
2000 This registry entry controls binary behavior and script behavior for ActiveX controls or plug-ins.
Notes about 1A02, 1A03, 1A05, and 1A06


The following four registry entries take only effect if the following keys are present:
{AEBA21FA-782A-4A90-978D-B72164C80120} First Party Cookie *
{A8A88C49-5EB2-4990-A1A2-0876022C854F} Third Party Cookie *
Registry entries
1A02 Allow persistent cookies that are stored on your computer #
1A03 Allow per-session cookies (not stored) #
1A05 Allow 3rd party persistent cookies *
1A06 Allow 3rd party session cookies *
----------------------------------------


To know, complete details about zone settings and security settings in IE, please refer http://support.microsoft.com/kb/182569


Contents are compiled from different resources. Respective copyrights are acknowledged.

K-Flakes # 2010-2: MS-VISIO Viewer 2003 on Windows XP 2002 SP2 not working - Solution


MS-VISIO Viewer 2003 on Windows XP 2002 SP2 not working - Solution

Recently, I faced problem with Ms-Visio viewer not working on my new system.

Symptoms: IE displays the Red X in the top left hand corner, when try to open any visio document.

I checked for the problem’s solution on Microsoft support. Following are some of the areas, which can be the issue.

1. KB973525 patch: After installing the MS-patch KB973525, Ms-visio might stop working.
Solution: Since Microsoft has stopped supporting MS-Visio 2003; the only option remains to uninstall KB973525; the functionality of Visio Viewer is returned.

2. If the above mentioned patch is not installed or uninstalling does not work; try the following

-        To change local policy group: Click Start, click Run, type gpedit.msc, and then click OK.

-        If you use a domain GPO to deny all add-ons in the add-on list:  Click Start, click Run, type “gpmc.msc”, and then click OK.

-        Right-click the domain GPO that you use to deny all add-ons in the add-on list, and then click Edit.


-        Expand Computer Configuration, expand Administrative Templates, expand Windows Components, expand Internet Explorer, expand Security Features, and then click Add-on Management.

-        In the Add-on Management pane, double-click Deny all add-ons unless specifically allowed in the Add-on list, click Not Configured or Disabled, and then click OK.

-        Click Start, click Run, type “gpupdate”, and then click OK.


3. If the step #2 still does not solve the problem, try following:

You need to delete the "Compatibility Flags" entry from the registry key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{279D6C9A-652E-4833-BEFC-312CA8887857}]

Imp Note: Please take the registry backup, just before the changes.

The above mentioned solutions are found on-trial basis. Hence, the solution is not guaranteed. It is advisable to take necessary backup before trying the solution; to prevent any loss.


Contents are compiled from different resources. Respective copyrights are acknowledged.

k-flakes # 2010-1: 4 different types of marketable US treasury securities


4 different types of marketable US treasury securities

US treasury securities are one of the popular investments; which is considered a very low-risk (safe) investment. Following are the 4 types of securities currently available.


1. Treasury bills
    - Short term securities with maturation less than a year.
    - Sold on discount on the face value. The investor gets the face value on maturity.
    - Investor's return = FACE VALUE - DISCOUNTED PRICE


2. Treasury Notes and Bonds

    - Long term securities. T-Note is issued with maturation between 1-10 years. T-bond is issue for more than 10 years.
    - The securities are sold on face value and interest is paid semi-annually.
    - The interest amount is the return to the investors.


3. STRIPS or Zero Coupon Bonds (ZCB)

    - Similar to T-Bills, sold on discount on the face value.
    - Like T-notes, its maturing period is longer than T-Bills.
    - This instrument is very sensitive to interest rates. As rates change, the price of a ZCB will change more than that of any other bond with similar maturity.


4. Treasury Inflation Protection Securities (TIPS)

    - The interest rate paid by TIPS is not fixed. It is linked with Inflation; i.e. interest rate = "Inflation + rate".
E.g. if the inflation is 3%; then a TIPS with 2% rate will pay 5% interest.

    - The rate is adjusted semi-annually according to the inflation change.
    - Since the return changes with inflation, the value to the security remains stable.



Contents are compiled from different resources. Respective copyrights are acknowledged.