How to disable automatic installation for Internet Explorer 7, 8 or 9

Block Internet Explorer Installation

What if the current version of Internet Explorer works perfectly fine on my Windows computer? Well, we should simply try to stay the same although, it is always necessary to try to follow Microsoft's suggestions when talking about a new update to your preferred browser.

The different updates that Microsoft eventually offers for Internet Explorer try to make it navigation is safer, stable and without the intervention of hackers who take advantage of a security hole. In any case, depending on the operating system we have on our computer, it may not be necessary to update to the most recent version.

Why shouldn't I install the new version of Internet Explorer?

As we mentioned before, a new version of Internet Explorer could involve different aspects of improved security and privacy, being the user of this browser and its operating system the one who must make the decision whether or not they want to. Microsoft installs the new version without any authorization.

For example, if we have received comments about a working instability of Internet Explorer 10 and on the computer we only have the previous version, then we should stick with it to avoid having to suffer such errors. So far in this article we will mention two alternatives to be able to block the installation of a new version of Internet Explorer, in the event that the end user has so decided and therefore assumes the consequences of what this could involve .

First alternative to block the installation of Internet Explorer

We are going to refer primarily to the three most used versions on older computers, that is, Internet Explorer 7, 8 or 9. In this first alternative, the process is limited to having to download a tool (ToolKit) that is provided by Microsoft and to which, we can download it from their own servers.

The download links for each of the versions of Internet Explorer which we have placed at the top, should choose the one that corresponds to the version of the browser you want to block. Once you do this, you can unzip the downloaded file. At that moment you will realize that its content has one of the cmd type, which suggests that we should open a terminal command window to be able to order its execution through a sentence.

IE9_Blocker.cmd / b

IE9_Blocker.cmd / u

The lines that we have placed in the upper part are an example of what you should do, that is, when having the command prompt window open, you can call the downloaded file with the / bo / u switch; the first one will block the installation while the second one will deactivate said block.

Second alternative to block the installation of Internet Explorer

Despite the fact that the previous method relies on tools that have been provided by Microsoft itself, many people may find it difficult to execute the downloaded file in a command terminal. For this reason, we recommend the use of a simple tool that has the name of Network Administrator Tool and that offers a more attractive interface with which perhaps many users come to identify more quickly.

Network administrator

The tool can be downloaded and used with an evaluation time, its use being a fairly simple process to follow. In the image that we have placed in the upper part you can realize this, because there are mainly three fields to fill in, these are:

  1. La selection of an action. Here we should choose the block we want to do for Internet Explorer in a specific version.
  2. Choose the computer. With this option instead we will have the possibility to choose the computer where we want to make this block effective.
  3. Access credentials. If the computer is in a local network then we must put the access credentials to it.

After having selected the aforementioned options, we will only have to press the button at the bottom of the Network Administrator Tool, which will start the Internet Explorer blocking process.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.