Category: Google Chrome
PC Games Hardware tested the speed of the internet browsers Internet Explorer 6, 7 and 8, Mozilla Firefox 2.0, 3.0.11 and 3.5b99, Opera 9.6 and 10, Safari 3.1.1 and 4.0, Chrome 1.0, 2.0 and 3.0 with the benchmarks Peacekeeper and Sunspider and checked them with the Acid tests as well.
Google has released an update for Google Chrome web browser which fixes a critical security issue and few networking bugs.
- CVE-2009-2121: Buffer overflow processing HTTP responses
Google Chrome is vulnerable to a buffer overflow in handling certain responses from HTTP servers. A specially crafted response from a server could crash the browser and possibly allow an attacker to run arbitrary code.
- NTLM authentication to Squid proxies fails when trying to connect to HTTPS sites
- Browser crash when loading some HTTPS sites
An analysis done by Microsoft between Google Chrome 2.0, Firefox 3.0 and Internet Explorer 8 shows that IE8 wins in 7 out of 10 categories, while 3 are draw.
So let’s analyze the categories. Continue Reading
Sam Allen from DotNetPerls.com has tested the most recent web browser versions to find out, which one of them consumes the most and least memory.
Usign script help, he has loaded 150 the most popular sites as per Alexa.com and monitored results.
Results: Continue Reading
It’s that time of the month again: web browser performance and benchmark results. This time it’s going to be a little bit different. The graph you are about to see is from Peacekeeper benchmark site and as James Gallagher explained to us: this chart is made from averaging results from thousands of PC with the three CPUs listed.
Safari 4 Beta
Safari 4 Final
Chrome 184.108.40.206 Beta Continue Reading
The latest Chrome version 220.127.116.11 and Safari 4.0 has fixed one of the vulnerabilities which was exploited in WebKit earlier this month.
As H Online describes: A vulnerability in WebKit can be exploited by an attacker to crash a tab or execute arbitrary code in Google Chrome due to a memory corruption issue in WebKit’s handling of recursion in certain DOM event handlers. For an attack to be successful, a victim must first visit a maliciously crafted website. The malicious code, however, will be sandboxed, limiting the damage that an attacker can do when exploiting the vulnerability.
Thanks to mabdul for sending this.
Entertainment and informational video hosting services, such as YouTube, Blip.tv, etc. can play quite a huge role in today’s people life. As millions of visitors spend more and more time on those sites, it’s time to see, which web browser works and which doesn’t. Yes, we are talking about compatibility here, from the most visited and popular sites, to not so well known.
For traffic stats, we are going to use Compete.com, 04/2009 data. As per my personal experience, actual numbers can be more than 10x times higher than reported. At least, that’s the case of FavBrowsr.com Continue Reading