The BladeForums.com 2024 Traditional Knife is ready to order! See this thread for details:
https://www.bladeforums.com/threads/bladeforums-2024-traditional-knife.2003187/
Price is $300 $250 ea (shipped within CONUS). If you live outside the US, I will contact you after your order for extra shipping charges.
Order here: https://www.bladeforums.com/help/2024-traditional/ - Order as many as you like, we have plenty.
K.V. Collucci said:I have always been a skeptic when it comes new browsers...
Blackwatch said:In Firefox, try going to File | Import and go from there. It should let you choose Opera and import the bookmarks.
zfox said:HI LC,
if you still have Opera, open it and see if you can Export the bookmarks to IE. Then import that file into Foxfire. (Good move! It's the only one I use now.)
Hope that helps,
Julian
Blackwatch said:You also could export the Opera bookmarks as a file (File | Import and Export), either HTML or whatever else it wants. That should be able to be imported into Firefox.
Which versions of Opera and Firefox do you have? Maybe you noted it above, but I just hopped back into this thread last night.
PhilL said:I jumped on the Firefox bandwagon and I liked it quite a bit, but then started running into problems. For one I was getting some real strange looking pages here on BFC. Different people's avatars started appearing all over th place and other wierd stuff. Someone suggested clearing the cache, and I did and it cleared it up for a bit, but then got wierd again. I have since gone back to Safari as my main browser.
Blackwatch said:Phil,
The same stuff happens to me on this forum, in Firefox. I just Ctrl + F5 (hard refresh) and it usually gets into some kinda better order. Glad to hear it isn't just me, though.
Bottom line is that you still need to keep security concerns in perspective no matter what browser you use.Mozilla Firefox Remote Code Execution
Affected:
Firefox version 1.0.2 and prior
Date of notice: 04/22/2005
Description: Mozilla Firefox has been steadily gaining market share among browsers. The Firefox browser contains multiple flaws that can be exploited to execute arbitrary code with the privileges of the logged-on user. The following are three of the more severe flaws:
(a) The "<link" tag can be used to load a custom image as a site's icon in Firefox. However, Firefox does not sufficiently validate the source for the custom image. Hence, by using "javascript:" URL as the image source, it is possible to execute arbitrary commands on the client. A proof-of-concept exploit has been posted. Note that visiting a malicious web page is sufficient to leverage this flaw.
(b) The "<embed" tag's "pluginspage" attribute is used to load the URL for installing a plug-in. By using a "javascript:" URL, it is possible to execute arbitrary commands on the client.
(c) A malicious webpage can open privileged pages such as about:config in the sidebar, and then use javascript URLs to execute arbitrary code on a user's system.
Status: Mozilla confirmed. Firefox version 1.0.3 has been released. This version fixes many other security vulnerabilities.
Council Site Actions: Just a handful of sites officially support or use Firefox. One site has already patched, as they received notification over the weekend. The other sites have advised their users to patch.
References:
Mozilla Advisories http://www.mozilla.org/security/announce/mfsa2005-34.html
http://www.mozilla.org/security/announce/mfsa2005-35.html
http://www.mozilla.org/security/announce/mfsa2005-36.html
http://www.mozilla.org/security/announce/mfsa2005-37.html
http://www.mozilla.org/security/announce/mfsa2005-38.html
http://www.mozilla.org/security/announce/mfsa2005-39.html
http://www.mozilla.org/security/announce/mfsa2005-40.html
http://www.mozilla.org/security/announce/mfsa2005-41.html
Posting by mikx
http://www.mikx.de/firelinking/ http://www.mikx.de/index.php?p=14 Mozilla Firefox MarketShare http://www.mozillazine.org/talkback.html?article=6263
SecurityFocus BIDs
http://www.securityfocus.com/bid/13211
http://www.securityfocus.com/bid/13216
http://www.securityfocus.com/bid/13228
http://www.securityfocus.com/bid/13229
http://www.securityfocus.com/bid/13230
http://www.securityfocus.com/bid/13231
http://www.securityfocus.com/bid/13232
http://www.securityfocus.com/bid/13233
Deadhead Archer said:Although Firefox isn't as heavily targetted for security risks as Microsoft products are, that doesn't mean that vulnerabilities still don't exist for certain versions:
Deadhead Archer said:Bottom line is that you still need to keep security concerns in perspective no matter what browser you use.