Internet Explorer Team Blog

June, 2014

  • IEBlog

    Vertical writing mode improvements in IE11

    Internet Explorer 11 June 2014 update improves and advances vertical writing mode layout. This enables features such as constant center baseline and ruby positioning preserving line height. Together, those improvements enable rich, interactive textbooks and publications for locales supporting vertical writing mode, such as Japanese locale. To get hands on experience and see the improvements please try the Vertical Writing Mode Improvements Test Drive : Center baseline allows characters and...
  • IEBlog

    Passwords in IE11

    Today’s Web relies on passwords as a form of authentication, which means people have to log into a variety of different services every day. Not only is typing passwords on touch devices cumbersome, but people are creating weak passwords and using the same password for every site, making them more vulnerable to identity theft. Having a secure, reliable password manager is the best method for encouraging people to create strong, unique passwords for every site.    With Internet Explorer 11, we’ve...
  • IEBlog

    Announcing Internet Explorer Developer Channel

    Summary: Go get the new Internet Explorer Developer Channel at devchannel.modern.IE ! Just a few weeks ago , we talked about creating a more open dialog between the IE team and the Web development community. Today we’re excited to announce the release of the Internet Explorer Developer Channel, a fully functioning browser designed to give Web developers and early adopters a sneak peek at the Web platform features we’re working on. The Developer Channel is available for download today...
  • IEBlog

    June 2014 Internet Explorer Updates

    Microsoft Security Bulletin MS14-035 - Critical This security update resolves two publicly disclosed vulnerabilities and fifty-seven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to...
Page 1 of 1 (4 items)