Full support for the features in browser. New way of writing native applications using web technologies: HTML5, CSS3, and WebGL. Follow Gregg on Twitter at or subscribe to Gregg's RSS feed. NW.js (previously known as node-webkit) lets you call all Node.js modules directly from DOM and enables a new way of writing applications with all Web technologies. Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. It was the first time for Firefox since browsers were designated as targets in 2009. Last week's contest was the third consecutive Pwn2Own that Chrome was not exploited by researchers. Smartphones running Google's Android and Microsoft Windows Phone 7 operating systems also escaped Pwn2Own unscathed. Coincidence?" tweeted Chris Evans, an engineer on the Chrome security team. WebKit Remote Debugging Protocol is a Google Chrome/Chromium debug protocol. "Both surviving browsers: open source, have bounty programs, have embedded security teams, better at faster fixes.
CHROME WEBKIT HOW TO
Anyway, here’s how to download Microsoft’s. This is not a laurel we are resting on, but I'm still happy about it," said Brendan Eich, Mozilla's CTO, in a tweet last week. The new Browser Wars aren’t about who makes the fastest or best browser, they’re about whose services you want and whose data policies you trust. and currently powers browsers such as Google Chrome, Apple Safari, the default iOS browser, and the default Android browser. Neither Chrome nor Mozilla's Firefox were challenged at last week's Pwn2Own: Researchers who had earlier signed up to take on the browsers didn't show or withdrew because they had failed to come up with reliable exploits in time for the contest.Įmployees of both Mozilla and Google touted the browsers' survival skills. Answer (1 of 5): Webkit is an open source web browser engine that was originated by Apple Inc. Google also awarded Iozzo, Pinckaers and Weinmann $1,337 from its own bug bounty program, adding to their cash take for the Pwn2Own hack.