1. The article [Q308090] explains that when you try downloading a Zip (.zip) file, the process doesn't succeed and can occur if the "Confirm open after download" option for this file type has not been set.

2. "WinInet" limits the number of simultaneous connections that it makes to a single HTTP 1.0 server to four simultaneous connections and If you exceed this limit, the requests are blocked until one of the current connections has completed. Connections to a single HTTP 1.1 server (specification (RFC2616) mandates the two-connection limit) are limited to two simultaneous connections. The four-connection limit for HTTP 1.0 is a self-imposed restriction that coincides with the standard that is used by a number of popular Web browsers. The article [Q282402] explains how to edit the system registry to configure Internet Explorer to have more than two download sessions.

3. Supplemental reading:

a. "Internet Explorer Stops Responding When You Use the FILE:// Protocol to Download a File (Q307094)."

b. "Internet Explorer May Lose the First 2,048 Bytes of Data That Are Sent Back from a Web Server That Uses HTTP Compression (Q312496)."

c. "Blank Web Page with Placeholder Icon and You Cannot Save a File to Disk (Q316537)."

d. "Internet Explorer File Downloads Over SSL Do Not Work with the "No-Cache" Header (Q323308)."

e. "File Download Dialog Box Appears After You Turn Off File Downloads (Q324098)."

4. When a link to a file is clicked that has a multimedia file name extension, the file may play in the main Internet Explorer window (Internet Explorer 6) or in Windows Media Player. To download, right-click the multimedia link, and then click Save Target As. When asked, specify where you want the multimedia file saved, [Q304839].

Note: All multimedia content may not save however because some content may be streaming media or may be protected.

5. When right clicking a Hypertext Markup Language (HTML) link, the Save Target As and Print Target commands may be unavailable. In addition, when you click Print on the File menu, the Print All Linked Documents check box may be unavailable which can occur if Content Advisor is enabled (Tools, Options, Content tab, and then under Content Advisor), [Q176316].

Note: If SP2 has been installed, your attention is invited to two new security control features in the Information Bar, the "Popup blocked" and the "Blocked download" (click to see a screen shot) that you may click to decide what to do, [Q843017]. In addition, "How to configure Internet Explorer automatic download prompts on your Windows XP Service Pack 2-based computer (Q883255)."

6. The article [Q883260] discusses the Attachment Manager (WinXP SP 2) which handles both e-mail attachments and Internet downloads and how different file types are handled based on their file extension. If an attachment is identified that might be unsafe, you cannot open the file, or you receive a warning. The following determines which:

? The type of program that you are using.

? The file type that you are downloading or trying to open.

? The security settings of the Web content zone that you are downloading the file from.

a. The article [Q320454] discusses and contains information about the "Microsoft Baseline Security Analyzer" tool (MBSA) (click to see a screen shot) that centrally scans Windows-based computers for common security misconfigurations and generates a "report" (click to see an example).

b. "ShieldsUP" is the Internet's quickest, most popular, reliable, most powerful, complete and trusted free online Internet security checkup and information service where at this site you can check your system for vulnerability and begin learning about using the Internet safely.

Note: The Attachment Manager classifies files that you receive or that you download as high, medium, or low risks based on the listed file type and the file name extension in this article.

7. Supplemental reading:

a. "Changes to Functionality in Microsoft Windows XP Service Pack 2."

b. "Outlook Express 6 - Using Windows XP Professional with Service Pack 2 in a Managed Environment: Controlling Communication with the Internet."

c. "Setting Up Security Zones."

d. "Chapter 27 - Security Zones."