With assistance from the United States Computer
Emergency Response Team (US-CERT), this slideshow will walk you through the
steps to configure Microsoft’s Internet Explorer to limit the damage from
hacker attacks. Keep in mind that, in some cases, these recommended
settings may interfere with normal usage of some applications.
Note that menu options may vary
between versions of IE, so you should adapt the steps below as appropriate.