Skip to main content


Posted August 2002 by Steve Sinchak

In Windows 9X/2000/ME/XP with MS IE 4/5/6,there is an annoying MS Internet Explorer vulnerability. Certain web sites force the opening of a hidden popup tracking minimized window upon your first visit, or when you leave their web site or close your browser while one of their web pages is still displayed.
They do this by using the little known "about:" browser built-in command into their HTML/DHTML/XML code.
There is not much you can do, except close it by right-clicking on it and selecting Close/Exit, or by highlighting it with a single mouse left-click and then pressing simultaneously Alt + F4. That is if you can detect its small taskbar icon, because it won't allow to be restored or maximized, unlike the other well behaved windows.
You can kill ALL MS IE "about:" URLs permanently with this Registry hack.
Create a REG file in Notepad (save it as NOABOUT.REG for example), with these lines:

--Begin copy & paste below-----
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults]
------End copy & paste above------

Then run NOABOUT.REG to merge this info into your Registry.
This will place all "about:" URLs into the MS IE Restricted Zone, which means they will not open anymore when using IE to surf the net.

Related Posts

If you own a Google Chromecast streaming device, you can easily share a browser tab in Chrome browser or even your entire desktop.  This can be very useful when presenting from your laptop or if you just want to watch something on a big screen that is only on your PC.  The only requirement is you must be on the same network as your Chromecast...

Read More

If you are a fan of minimalist desktop experiences, hiding the desktop icons are an easy way to clean up the Windows interface.  Instead of saving everything to your desktop, use the default profile folders such as downloads and documents.  Actually hiding all the icons on your desktop is a very simple customization hidden in the right-click context menu.  Just right-click on the desktop, select View...

Read More

Google security researchers have published details about a major security flaw found in the SSL protocol that is used to encrypt data transferred between your browser and a web server. SSL is typically used in situations where logon credentials are validated...

Read More

Enabling two-factor authentication is a great way to add an additional level of protection to your Microsoft account.  Even if your password is stolen, your account is still protected because two-factor authetication requires an additional level of verification to log in. Microsoft calls their version of two-factor authentication "two-step verification" and it works by providing you with a random code...

Read More