Internet Explorer Team Blog

July, 2008

  • IEBlog

    Wanted: IE8 Beta Testers

    As previously mentioned in the IE8 Beta Feedback post back in March, we have several ways to submit feedback on the IE8 Beta. Currently the only way to directly file a bug with the IE Team is to be a part of the IE8 Technical Beta program on Microsoft Connect . Beta 2 is right around the corner and we are expanding our reach! If you wish to be a part of making IE better by contributing great bug reports then please email us at and tell us a little about yourself including why you...
  • IEBlog

    IE8 and Reliability

    Developing technologies that work reliably on their own and as part of the computing ecosystem is core to our mission and is an important part of our commitment to Trustworthy Computing. Our customers and partners expect technologies and services they can depend on anytime, anywhere, and on any device. We focus on constant improvements to the dependability of our technologies and services. For Internet Explorer, reliability means that the browser should always start quickly, perform well, connect...
  • IEBlog

    Font Embedding on the Web

    Hi! It’s Bill Hill here again, still fighting the good fight to make typography on the Web as good as we’re used to seeing in print. We made significant progress this week, when one of the USA’s most prestigious font companies announced its support for the Embedded OpenType format for font embedding on the Web, and launched a new website to promote other browsers to support it in addition to Internet Explorer (which has had EOT support built-in since 1996). At the same time, Ascender Corporation...
  • IEBlog

    July Chat with the IE Team on Thursday

    Join members of the Internet Explorer team for an Expert Zone chat next Thursday, July 17 th at 10.00 PDT/17.00 UTC. These chats are a great opportunity to have your questions answered by members of the IE product team. Thank you to all who have attended the chats to date! If you can’t join us online, all chat transcripts are published here . Allow approximately 7-10 days following a chat for the transcript to go live. Hope you can join us on Thursday! Kristen Kibble Program Manager P...
  • IEBlog

    IE8 AJAX Navigation

    Hi, I’m Sharath Udupa, developer on the IE team focusing on AJAX features for IE8. One of the AJAX improvements we adopted in IE8 from HTML5 is AJAX page navigations. In IE8 mode, we provide support for script to update the travel log components (for e.g. back/forward buttons, address bar) to reflect client-side updates to documents. This allows a better user experience where users can navigate back and forth without messing the AJAX application state. For more information regarding the feature...
  • IEBlog

    IE8 Security Part V: Comprehensive Protection

    Hi! I’m Eric Lawrence, Security Program Manager for Internet Explorer. Last Tuesday, Dean wrote about our principles for delivering a trustworthy browser ; today, I’m excited to share with you details on the significant investments we’ve made in Security for Internet Explorer 8. As you might guess from the length of this post, we’ve done a lot of security work for this release. As an end-user, simply upgrade to IE8 to benefit from these security improvements. As a domain administrator, you can use...
  • IEBlog

    IE8 Security Part IV: The XSS Filter

    Hi, I'm David Ross, Security Software Engineer on the SWI team. I’m proud to be doing this guest post on the IE blog today to show off some of the collaborative work SWI is doing with the Internet Explorer team. Today we are releasing some details on a new IE8 feature that makes reflected / “Type-1” Cross-Site Scripting (XSS) vulnerabilities much more difficult to exploit from within Internet Explorer 8. Type-1 XSS flaws represent a growing portion of overall reported vulnerabilities and are increasingly...
  • IEBlog

    IE8 Security Part III: SmartScreen® Filter

    As someone whose email address is posted in thousands of forum posts, newsgroup discussions, and blogs, I get a lot of spam. Of the spam I receive, a significant number of messages represent phishing attacks . Most of these lures aren’t very clever or convincing, but phishing has become a simple numbers game—hosting phishing sites is cheap, and even if only a few users fall for any given phishing attack, attackers will profit by increasing the volume of phishing campaigns. In Internet Explorer...
Page 1 of 1 (8 items)