{"id":13120,"date":"2015-10-13T06:00:23","date_gmt":"2015-10-13T10:00:23","guid":{"rendered":"https:\/\/cimbcc.org\/test2\/?p=13120"},"modified":"2023-10-16T22:15:51","modified_gmt":"2023-10-17T02:15:51","slug":"internet-explorer-la-navigation-en-mode-inprivate","status":"publish","type":"post","link":"https:\/\/cimbcc.org\/test2\/internet-explorer-la-navigation-en-mode-inprivate\/","title":{"rendered":"Internet Explorer: la navigation en mode \u00ab InPrivate \u00bb"},"content":{"rendered":"<figure id=\"attachment_24120\" aria-describedby=\"caption-attachment-24120\" style=\"width: 125px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24120\" src=\"https:\/\/cimbcc.org\/test2\/wp-content\/uploads\/photo_dion_celine.jpg\" alt=\"\" width=\"125\" height=\"126\" \/><figcaption id=\"caption-attachment-24120\" class=\"wp-caption-text\"><span style=\"color: #ffffff;\">mmmm<\/span>C\u00e9line Dion<\/figcaption><\/figure>\n<h5 style=\"text-align: left;\"><strong>Internet Explorer\u00a0: la navigation en mode \u00ab\u00a0InPrivate\u00a0\u00bb<\/strong><\/h5>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Le sujet de la pr\u00e9sente chronique S\u00e9curit\u00e9 est tir\u00e9 de la troisi\u00e8me pr\u00e9sentation de <strong>Michel Gagn\u00e9<\/strong> sur la s\u00e9curit\u00e9 des comptes Hotmail et Outlook, au mois d&rsquo;avril 2015.<\/span><\/p>\n<p><!--more--><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Durant sa troisi\u00e8me pr\u00e9sentation sur le sujet de la s\u00e9curit\u00e9 des comptes Microsoft (Hotmail et Outlook) en avril dernier, Michel Gagn\u00e9 nous a expliqu\u00e9 qu&rsquo;il \u00e9tait pr\u00e9f\u00e9rable d&rsquo;utiliser la fonction \u00ab\u00a0InPrivate\u00a0\u00bb de votre navigateur lorsque nous allons sur nos sites sensibles, comme par exemple notre compte bancaire, au lieu de passer notre temps \u00e0 supprimer notre historique de navigation.<\/p>\n<p style=\"text-align: justify;\">De cette mani\u00e8re, vous ne laissez aucune trace de navigation SEULEMENT \u00e0 partir de cette session de navigation (dans laquelle vous inscrivez des informations personnelles et confidentielles), et cela sans pour autant tout supprimer vos informations de navigation ant\u00e9rieure \u00e0 cause que vous avez choisi de supprimer tout l&rsquo;historique.<\/p>\n<p style=\"text-align: justify;\">Pour ce faire, allez dans le menu OUTILS de votre navigateur et choisissez l&rsquo;option \u00ab\u00a0Navigation InPrivate\u00a0\u00bb (ou appuyer sur les touches Ctrl + Maj +P)\u00a0:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/cimbcc.org\/test2\/wp-content\/uploads\/CHIP_20151013.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13122\" src=\"https:\/\/cimbcc.org\/test2\/wp-content\/uploads\/CHIP_20151013.jpg\" alt=\"CHIP_20151013\" width=\"494\" height=\"355\" srcset=\"https:\/\/cimbcc.org\/test2\/wp-content\/uploads\/CHIP_20151013.jpg 494w, https:\/\/cimbcc.org\/test2\/wp-content\/uploads\/CHIP_20151013-300x216.jpg 300w\" sizes=\"auto, (max-width: 494px) 100vw, 494px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">C&rsquo;est \u00e0 ce moment que vous pouvez ouvrir l&rsquo;adresse du site dans laquelle vous devez entrer des informations sensibles.\u00a0 Lorsque vous avez termin\u00e9, vous n&rsquo;avez qu&rsquo;\u00e0 fermer cet onglet.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><em>Les contributions de tous les b\u00e9n\u00e9voles \u00e0 la chronique \u00ab\u00a0<\/em><em>S\u00e9curit\u00e9<\/em><em>\u00a0\u00bb sont bienvenues. Si vous voulez soumettre un article sur la s\u00e9curit\u00e9, envoyez-le \u00e0 l\u2019adresse <\/em><a style=\"color: #000000;\" href=\"mailto:celine.diondarveau@outlook.com\"><em>celine.diondarveau@outlook.com<\/em><\/a><em> \u00e0 l\u2019attention de C\u00e9line Dion.<\/em><\/span><\/p>\n<p>C\u00e9line Dion<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet Explorer\u00a0: la navigation en mode \u00ab\u00a0InPrivate\u00a0\u00bb Le sujet de la pr\u00e9sente chronique S\u00e9curit\u00e9 est tir\u00e9 de la troisi\u00e8me pr\u00e9sentation de Michel Gagn\u00e9 sur la s\u00e9curit\u00e9 des comptes Hotmail et Outlook, au mois d&rsquo;avril 2015.<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[404,245],"class_list":["post-13120","post","type-post","status-publish","format-standard","hentry","category-chronique-securite","tag-inprivate","tag-internet-explorer"],"_links":{"self":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts\/13120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/comments?post=13120"}],"version-history":[{"count":10,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts\/13120\/revisions"}],"predecessor-version":[{"id":25258,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts\/13120\/revisions\/25258"}],"wp:attachment":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/media?parent=13120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/categories?post=13120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/tags?post=13120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}