IE8 PASS ACID2 – ACID2 FAILED W3C

Update: This article is more or less misleading. According to Asa Dotzler (mozilla.org) ↓. The CSS Error is intentionally added by the “Web Standards Group” for Error handling test.

I read this news at kakkoi recently, following up on announcements at IEblog about their recent glorified claimed with IE8 ACID2 Milestone .

Acid 2

ie8 pass acid2 - acid2 failed w3cFor those who doesn’t know much bout CSS specifications. ACID2 is a standard CSS Test page maintained by The Web Standards groups. This is where Browser Vendor test their Browser CSS rendering capability. The first batch to pass this test is opera 9.1, icab (osx) & Firefox 3a.

The most popular browser vendor (Microsoft Internet Explorer) just pass this test for IE8 (a) Browser. I’m quite happy as Internet Explorer is a big liability to support by most web developer. Unfortunately The ACID2 Test pages FAILED W3C CSS2.1 Validations.

43 	 Parse Error - second two]
88 	.parser-container div 	Value Error : color orange is not a color value : orange
94 	.parser 	Property error doesn't exist : }
97 	.parser 	Property m rgin doesn't exist : 2em
97 	Parse error - Unrecognized };
99 	.parser 	Value Error : width only 0 can be a length. You must put an unit after your number : 200
100 	.parser 	Value Error : border Lexical error at line 96, column 38. Encountered: "e" (101), after : "! "error;
100 	.parser 	Value Error : border Parse error - Unrecognized }
101 	.parser 	Value Error : background Too many values or values are not recognized : red pink

Related Links

3 Comments

Filed under CSS, Internet Browser, OWNED

Bill Gates is funny

Jonathan Snook is having a good evening at Mix’n’mash Conferences 2007. His simple question spurs out hilarious response from bill gates. Read all the transcript at snook.ca.

Leave a comment

Filed under bubbles, conferences, microsoft

Matt Heaton (Bluehost and Hostmoster CEO) wordpress blog Hacked by Mick Jagger from Moscow

wordpress.net.in remote spam injection, Matt’s heaton unaware that he uploaded the backdoor himself. Check his wordpress footer.

Matt Heaton (Bluehost and Hostmoster CEO) got Hacked by Mick Jagger

Full cache on google will not show the spam link (cloaking) used text-only cache.
As of this time of writing he’s still using WordPress 2.0.

While you are on mattheaton.com  footer check out the “Comment (RSS)” links. The “RSS” part is misleading. its redirect to http://cwings.ulmb.com/alexa.php?c=bluehost.com instead of the Comments Feeds. go figure

What this got to do with Mick jagger?

lol i knew u asked that, read it all at kakkoi.

5 Comments

Filed under bluehost, hack, hostmonster, injection, vulnerability, wordpress

jitScript – safe load external javascript , prevent duplicate

snipplr

var regJs = "";
var JitScriptDebug = false;

var kaizekuJitScript = {
  src: function(){ kaizekuJitScript.jitScript(this);},
  jitScript: function(src){
  var iArray = (src instanceof Array) ? src : src.split(/s*,s*/) ;
  for (i = 0; m = iArray.length, i < m; i++){
	var uri = iArray[i];
	  if (regJs.indexOf(uri) ==- 1) {
		var s = document.createElement('script');
		s.src = uri;
		if (s instanceof Object){
			try{
			document.body.appendChild(s);
			} catch(e){
				document.write('<script type="text/javascript" src="'+uri+'"><\/script>');
			}
	  	}
			regJs += uri + "|";
		} else {
			if (JitScriptDebug){
				kaizekuJitScript.fireBuglog("Reject duplicated entries: %s",uri);
				kaizekuJitScript.displayloadedJS();
			}
		}
	}
},
isJsLoad: function(){
	var iArray = (this instanceof Array) ? this : this.split(/s*,s*/) ;
	var d = regJs;
	for (i = 0; m = iArray.length, i < m; i++){
		var n = iArray[i];
		var r = (d.indexOf(n) ==- 1) ? false : true;
		if (JitScriptDebug) kaizekuJitScript.fireBuglog(n + " %s",r);
		return r;
	}
},
fireBuglog:function(str,ref){ if(typeof console != "undefine") { console.log(str,ref)} },

displayloadedJS:function(display){
	var ln = 'Loaded script\n', js = regJs.split("|");
	for(var i =0; i < (js.length - 1 ); i++){
		var str = '('+(i+1)+') : ' + js[i] + '\n';	ln += str;
	}
	( (display == false ) ? alert(ln) : kaizekuJitScript.fireBuglog("%s",ln) );
}
};

Array.prototype.jitScript = kaizekuJitScript.src;
String.prototype.jitScript = kaizekuJitScript.src;
Array.prototype.isLoadJs = kaizekuJitScript.isJsLoad;
String.prototype.isLoadJs = kaizekuJitScript.isJsLoad;

Example

var lib = ['foo.js','foo.js','foo2.js','foo.js','foo333.js','foo2.js'];
var slib = 'fooooo.js';

lib.jitScript(); // append foo.js, foo2.js & foo33.js
slib.jitScript(); // append fooooo.js

enable firebug console
JitScriptDebug = true;

validate scripts
lib.isJsLoad(); //return bool
some real live example can be found here view source output.js

Leave a comment

Filed under javascript

Smashing Magazine Selected Wallpapers for Your Desktop VOL III

Smashing Magazine latest compilation of Selected Wallpapers For Your Desktop is nicely sort by specific genre with various selections from general wallpaper, widesreen wallpaper, HD wallpaper, game wallpaper, and social wallpaper. To name a few, some of the gallery include Wallpaper.ru, Bestgamewallpapers, Adobe CS3 Wallpaper, Socwall, Desktop Nexus, Flickr Wallpaper Designer Pool, DesktopoGraphy, Gallery of Art and AnimePaper. Animepaper! I’m really surprise, because from out of hundred Anime wallpaper website, Animepaper is in the Smashing list.

smashing magazineSmashing Magazine is a weblog dedicated to web-developers and designers. They have the best compilation of web design resources and wonderful new ideas.

More on this at kaizeku ban
Animepaper on Smashing Magazine List of Selected Wallpapers

Animepaper
Hundreds of wallpapers with themes from Japanese anime. In different resolution…~Smashing Magazine

Related Links

Leave a comment

Filed under wallpaper

Firefox 2.0.0.7 Update – Quicktime Pwns Firefox

firefoxA serious vulnerability in Mozilla Firefox has been addressed in release 2.0.0.7 which is now posted to the Firefox web site. The exploit involved an issue in Apple QuickTime that could reportedly lead to a full compromise of the browser and possibly the underlying operating system.

The vulnerability reported by Petko D. Petkov at gnucitizen.org , who also reported on two other QuickTime vulnerabilities last year.

Workaround: Disabling JavaScript in the browser does not protect against this attack; in vulnerable versions scripts passed through the -chrome option would be executed regardless of the JavaScript setting for web content, much as interpreters for languages such as Perl and Python execute scripts passed on the command line. The NoScript add-on, however, has provided protection against this class of attack since the cross-browser vulnerabilities described by MFSA 2007-23 were discovered. ~ Mozilla Foundation Security Advisory 2007-28

Download

Firefox 2.0.0.7 is now available for Windows, Mac, and Linux for free download from http://getfirefox.com.

Continue reading

Leave a comment

Filed under Internet Browser, Mozilla Firefox

New animepaper gallery

Similar wallpapers gallery & Hex colors Gallery???
animepaper has  lots of candies inside their developer pocket check out the new features at animepaper.net more details info regarding the new update can be found at blog.kaizeku.com 

Leave a comment

Filed under animepaper