摘要:
Webpage domain monitoring is described. In an implementation, one or more web pages are obtained at a client, with each said web page including a plurality of content that is provided, respectively, via a plurality of domains. The plurality of domains that were used to provide the plurality of content is identified and a counter is incremented, respectively, for each identified domain. When the counter for a respective said domain exceeds a threshold, a notification is output by the client that indicates that the respective said domain has a likelihood of tracking the client.
摘要:
Techniques to facilitate finding a tab or tabs in a user interface window are described. Various embodiments present tabs, individual tabs being associated with an opened document such as a web page or an activity, in a user interface window and automatically group at least some of the tabs together in a visually distinctive way. In at least some embodiments, this grouping is performed in response to a user interacting with the tabs in a particular way. For instance, a user may cause a tab to be created or moved within the user interface window such that the tab is grouped with a tab group or ungrouped from a tab group. Furthermore, one or more embodiments provide for certain tab-related actions, such as selecting an active tab and changing a display of a title of a tab, which can be performed in a manner based at least in part on this grouping.
摘要:
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege level that can prohibit the application from accessing portions of an associated computing device. For example, in some embodiments, the restricted process can prohibit applications from read and write access to portions of a system's computer-readable media, such as the hard disk, that contains administrative data and settings information and user data and settings. In these embodiments, a special portion of the disk, termed a “containment zone”, is designated and used by applications in this restricted process.
摘要:
Techniques to facilitate finding a tab or tabs in a user interface window are described. Various embodiments present tabs, individual tabs being associated with an opened document such as a web page or an activity, in a user interface window and automatically group at least some of the tabs together in a visually distinctive way. In at least some embodiments, this grouping is performed in response to a user interacting with the tabs in a particular way. For instance, a user may cause a tab to be created or moved within the user interface window such that the tab is grouped with a tab group or ungrouped from a tab group. Furthermore, one or more embodiments provide for certain tab-related actions, such as selecting an active tab and changing a display of a title of a tab, which can be performed in a manner based at least in part on this grouping.
摘要:
Architecture that creates an independent system which takes as input standard 2D layers and composites and renders the layers in 3D. Hardware accelerated graphics effects can be added to these layers, and additionally, the layers can be animated independently. Layer types provided include CPU, bitmap, GPU, and Direct2D. The layers are organized in trees and the layer manager handles the layers composition, rendering, and animations on hardware or software devices. Layers have properties such as visibility, 3D coordinates, for example. Animations and transitions can be provided at the layer and layer property level.
摘要:
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege level that can prohibit the application from accessing portions of an associated computing device. For example, in some embodiments, the restricted process can prohibit applications from read and write access to portions of a system's computer-readable media, such as the hard disk, that contains administrative data and settings information and user data and settings. In these embodiments, a special portion of the disk, termed a “containment zone”, is designated and used by applications in this restricted process.
摘要:
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege level that can prohibit the application from accessing portions of an associated computing device. For example, in some embodiments, the restricted process can prohibit applications from read and write access to portions of a system's computer-readable media, such as the hard disk, that contains administrative data and settings information and user data and settings. In these embodiments, a special portion of the disk, termed a “containment zone”, is designated and used by applications in this restricted process.
摘要:
Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the application invokes a trust manager to evaluate the security risks. The trust manager invokes a plurality of trust evaluators, where each trust evaluator is responsible for analyzing and assessing a different security risk. Upon completion of each security risk evaluation, results of those individual security risk evaluations are returned to the trust manager. The trust manager aggregates the variety of security risk evaluation results and makes a security determination based on the aggregated evaluation results. That determination may be to move forward with loading the application, to block the load of the application, or perhaps to prompt the user for a decision about whether to move forward with the load.
摘要:
Webpage domain monitoring is described. In an implementation, one or more web pages are obtained at a client, with each said web page including a plurality of content that is provided, respectively, via a plurality of domains. The plurality of domains that were used to provide the plurality of content is identified and a counter is incremented, respectively, for each identified domain. When the counter for a respective said domain exceeds a threshold, a notification is output by the client that indicates that the respective said domain has a likelihood of tracking the client.