Web Browser

HTML 5 Geolocation {12}

by David F

HTML 5 Geolocation

            Need help finding a restaurant? What if someone is lost and they need to get their bearings straight? Getting lost is never fun, but with Geolocation convenience is literally at the palm of their hands. With some simple swipes on a smartphone, a user may never get lost ever again, provided that worst case scenarios such as losing their phone or having poor connections doesn’t happen of course. In this blog, I will explain what Geolocation is, the benefits of using Geolocation, how it can help businesses, and what businesses use Geolocation; I will also discuss some concerns associated with the software. read more...

New Ways to Attack: AJAX Targeted {5}

by Monica G
There are plenty of ways to attack someone’s computer, maybe through a virus aimed at attacking their personal documents or the type of software designed to retrieve account numbers, passwords, etc. from any server. The beauty is that we have firewalls and antivirus to prevent events like the ones mentioned above from happening. But with the evolution of technology has come the growth of virus and malware. People have become more creative in their designs. This can clearly be seen in the new wave of attacks, which was found by researchers from M86 Security. The attacks use AJAX, Asynchronous JavaScript and XML, to break apart payloads into very small pieces of code that are later assembled, therefore making them harder to detect by firewalls and antivirus. According to Moshe Basanchig, the attacks seemed to be happening to a company’s server in China. The researchers were able to confirm that the code begins on a page with legitimate JavaScript code then after it passes through the firewalls enabled, it assembles on the client’s page (in your Web browser’s memory) before it is executed. This “payload fragmentation technique” makes it virtually impossible to detect because when you have code that looks fine and only becomes a problem after its been loaded, it can easily pass through the network interface level. There is some good news to all havoc, some antivirus are able to block that code when it’s attempting to reassemble. And there are things we can do to prevent it from happening to us, like keeping everything updated, and most importantly, never going to a website or loading anything that looks malicious. read more...

The Most Innovating Feature of HTML5 {7}

by Yeimy F
 HTML5 is the latest version of the Hypertext Markup Language used to present content on the World Wide Web. Even though, this version is still under development, one of the innovating features is the allowance to include 3D graphics on the Web pages without the need for plug-ins. The Web-based Graphics Library (WebGL) has extended the capability of JavaScript programming language to create 3D graphics within any compatible Web browser such as Firefox, Opera, and Safari . Now, Web developers can access OpenGL, computer graphic API, through JavaScript to incorporate 3D with HTML content. Moreover, the specifications for hardware that enables such graphics have been specified already by the Kronos Group. There is already a variety of computer software programs such as “C3DL, CopperLicht , EnergizeGL, GammaJS, GLGE, GTW, O3D, OSG.JS, SceneJS, SpiderGL, TDL, Three.js and X3DOM that Web developers can use to easily create a Web page with 3D content.” This new feature will provide users with an exciting experience on the Web gaming, and better involvement with educational and training applications. read more...

Adobe abandons mobile Flash development, report says {1}

by Marco M
“Adobe flash on the way out”

A statement released by Adobe announced that they will no longer continue to develop their Flash Player plug-in for mobile browsers; Adobe added that “end of the Flash era on the web is coming soon.” Adobe is now focusing on the development of a different application packaging read more...

Wrinkled Silk {2}

by Luis F
The article was about Amazon’s new tablet the Kindle Fire, and its browser, Silk, that tracks every habit of its customers while using the browser.  It states that it utilizes Amazon’s cloud, Compute Cloud, to filter data in order to speed up connectivity to all websites compared to conventional web browsers.   In order for it to occur every movement performed by the user whilst using the browser is recorded, raising issues about privacy. read more...