OneTab, a free Chrome add-in, converts a set of browser tabs into a page of links, then restores the tabs when required. It can instantly free up gigabytes of memory when you need it for something else.
Showing results 1 to 20 of 63
Primate Labs' recently released a online charts for its Geekbench Browser for iOS and Android devices. The charts presents comparisons of processor and memory benchmark tests submitted by Geekbench app users.
Swiffy, a tool that converts most .SWF files into a more browser-friendly HTML5 format, is now available through Google Labs.
Firefox creator Mozilla will focus on reducing the memory footprint of the browser through a dedicated MemShrink team, according to comments posted online by one of the developers.The organisation started the dedicated MemShrink effort in response to concerns from consumers over the growing memory demands of the browser.
The security researcher who found and reported this critical buffer overflow and memory corruption vulnerability in Mozilla's Firefox browser is none other than Alex Miller, a 12-year-old boy who earned a $3,000 bounty for his discovery.
Sony has revamped the Memory Stick PRO-HG Duo HX, which now cuts the amount of time it will take to transfer files from your memory card to your computer by 50 percent.
Exploit code is available for a memory corruption flaw in Internet Explorer 6 and 7, which could allow an intruder to crash the browser or send a user to a malicious web page
Since IE8 shipped last week, I've read two criticisms repeatedly: One is the burning question of whether IE8 is faster or slower than its competitors; the other is whether it makes reasonable use of system resources. In this post, I explain why some people are seeing performance issues (and share an obscure system tweak that might just cure IE8 performance and stability problems). I also take a closer look at why you might prefer a browser that uses more memory than others.
Even though I have mobile phones with powerful web browsers, such as the G1 browser and S60 browser, I still go back to using Opera Mini the majority of the time. I like that I can login to my Opera Link account and have the same bookmarks on every device I use with no real effort on my part. I also find the speed to be excellent and the shortcuts and viewability to be extremely useful and attractive. On my G1 I can cache data to the storage card while the integrated browser consumes all of my onboard memory. Opera just released their latest State of the Mobile Web report for January 2009. Usage of Opera Mini went up 12.2% to 20 million unique users.
As I pointed out in a recent post regarding the current firmware on the T-Mobile G1 Google Android device there is a major issue with not being able to store applications or content onto the external microSD card. I get low memory errors daily and if I browse a lot with the device my browser cache fills up to 10MB+. Then when I delete the data I lose all my history, bookmarks, etc. and this really limits my usage of the G1. Opera thankfully announced today that its Opera Mini 4.2 product for the Android platform is out of beta already and available as a full release in the Android Market.
Google has seeded a new version of its Chrome browser to developers with fixes for a pair of security issues that could expose users to data theft.The issue, rated as a "moderate" risk could allow hackers to use HTML files to steal arbitrary files from a victim's machine.
In the Friday nostalgia department, TechRepublic's John Sheesley has unearthed an emulator for the Apple II. All you need is a browser and you're off to memory lane.
For all the talk about Google's Chrome browser and whether it's a Web operating system, platform for applications and future Microsoft killer it's quite possible that folks are overthinking the search giant's intentions. Perhaps Google's browser is really about protecting its ad backside.
Earlier today I published a lengthy blog post questioning some of the sensationalist conclusions raised in press coverage of a paper presented by Alexander Sotirov and Mark Dowd at last week’s Black Hat Conference in Las Vegas. This afternoon, I received an e-mail from Sotirov, who says he was "horrified by the lack of understanding displayed by the tech press when they covered the paper." He agreed to a follow-up interview, in which we discussed Microsoft's reaction to their research, how Windows users should respond to this news, and how they conducted field research into whether girls really are impressed by browser memory protection bypasses.
In this IT Dojo video, Bill Detwiler shows you a simple monitoring solution that uses Windows Server 2003 Group Policy.Before watching the video, you should realize this tip isn't right for every situation. This method uses Windows XP and Internet Explorer's local browsing history. To view the history files, you must physically visit each machine, remotely access the machine, or copy the files to a network location with a script. Furthermore, a sophisticated end-user could easily navigate to and delete the browser history. This monitoring technique is best suited when monitoring a small number of users, or better yet, a single, problem user.
As you're all well aware by now, the latest version of everyone's favorite browser is slated for release today.There's been a whole lot of coverage of the release -- Adrian Kingsley-Hughes details the changes here, Mary Jo Foley covers Microsoft competition here, musings about memory usage here and benchmarking here.
So how much memory do modern web browsers consume when pushed hard? This was the question prompted by my Firefox 3.0 a memory hog? post yesterday.So how do the browsers stack up against each other?
Hollywood would have IT pros believe that the biggest threat to network security comes from international super hackers or high school kids trying to download games like global thermonuclear war. In reality, we face a more mundane threat--our end users, particularly those wielding USB storage devices.These pocket-sized devices can store a large amount of data. But even if your users aren't planning to cart off sensitive company files, USB storage devices (external hard drives, camera, memory stick, MP3 players, etc.) can be a headache in other ways. Employees may use your networks to download music to their USB-based MP3 players. New USB flash drives, such as SanDisk's U3 smart drives, can even run software directly from the device--a perfect tool for the end-user who wants to run unauthorized software on your network.If your concerned about USB storage devices on your network and don’t feel a written policy alone will protect your data, disabling the devices is your next step.In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology Editor, shows you how to disable USB storage devices on both Apple OS X and Windows. The United States National Security Agency (NSA) described the process in a March 2008 document from the agency's Information Assurance Directorate.Once you've watched this IT Dojo video, you can read the original TechRepublic article, download PDF version of this tip, and learn more about mitigating the risks poses by USB storage devices from our IT Dojo blog.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)