(805) 652-0770

Posts Tagged ‘browsers’

  • Check Out The Latest Firefox 5

    Posted on June 27, 2011 by infogrip-tech

    Just three months after the release Firefox 4, Mozilla has released Firefox 5 for the desktop and Android devices.

    That’s a big change from the two years it took to move from Firefox 3.5 to Firefox 4. Firefox 5 is part of Mozilla’s new rapid release development cycle. Which is more like what Google does with its Chromer browser and promises faster updates. Mozilla wants Firefox to hit version 7 by the end of the year.

    Visually, Firefox 5 looks identical to Firefox 4. Rather than reinventing the wheel, Mozilla has added better support for web standards, fixed some bugs, made performance enhancements and added a few additional code touches.

    The big new features, courtesy of the release notes is:

    1. Support for CSS animations
    2. Better visibility for the Do Not Track header preference
    3. Improved canvas and JavaScript support
    4. Better standards support for canvas, HTML5, XHR, MathML and SMIL
    5. Better tuned HTTP idle connection logic


    Firefox 5 is fast — even faster than Firefox 4. It’s nice to see the more frequent update cycle, because it means that the browser will be more able to support the latest and greatest browser features.

    To update to the latest Firefox, click on the “check for updates” button in the “About Firefox” menu.

  • Most Browsers Can be Made to Give Up Personal Data

    Posted on August 04, 2010 by infogrip-computer-support

    All the common browsers are subject to exploits that use the auto-complete feature to force them to give up personal data, as presented at Black Hat security conference last week. Computer World reports that the presentation “Breaking browsers: Hacking Auto-Complete” is by Jeremiah Grossman, the CTO of WhiteHat Security. None of the techniques used were that difficult and the data that can be gathered from auto-complete includes names, addresses, e-mail addresses, and sometimes passwords, credit card numbers, and search entries. That data can be used to break into bank or email accounts, or to set the victim up for more malware that can get more data out of them. (more…)