Feeds

Internet Explorer - now with 35% less FAIL

Playing catchup with IE8 beta 2

Maximizing your infrastructure through virtualization

Internet Explorer 8 beta 2 has been released, and it certainly makes for better browsing than the rough-around-the-edges beta 1 build.

Rather than recommend the code only to web designers and developers of stout courage, Microsoft is throwing open the door for end-users one and all. The build adds some notable security and search functions into the mix, but it's still going to be a hard sell to woo back all those that already parted ways with Internet Explorer for greener pastures.

In terms of features, much here is simply catch-up to the likes of Firefox, Opera, and Safari. So, while IE8 is easily an improvement over its predecessor, the browser's place amongst the competition is extremely debatable. (Nice bit of diplomacy, eh?)

So let's see what makes IE8 tick.

Site suggestions

A new "Suggested Sites" feature recommends other websites of interest based on the user's history. Neat, but in the long run, probably about as useful as Google's "Feeling Lucky" button.

El Reg: often described as the "ants swarm over Houston area" of Europe

There also appears to be some interesting six-degrees-of-Kevin-Bacon-like behavior in its algorithm.

Safer self-sex

As we couldn't help but mention earlier, beta 2 also introduces Microsoft's own version of "privacy mode" browsing. Dubbed "InPrivate Browsing," it opens a new window that conveniently wipes itself clean when closed. The browsing session's web page history, passwords, address bar data, and autocomplete data are not stored, and cookies and other temporary internet files get deleted when the session is over. Meanwhile "InPrivate Blocking" prevents some ads and other content from showing up on web pages.

Microsoft claims InPrivate is just fantastic for some oh-so-likely scenarios such as "shopping for a gift on a family PC." Yeah...shopping for gifts. That's the ticket. Now if only there was a way to hide that 80GB stash of "gift idea jpgs."

Safely trip the skin fantastic

We should note that there are certainly other ways to track someone's web use without any access to localized data. But this kind of feature is at least effective for thwarting rookie snoops.

Robust right clicks

For some reason, Microsoft changed the name of its contextual right-click tools that debuted in beta 1. They were called "Activities," and now they're "Accelerators." The function, however, remains the same.

Accelerators simply suggest several common operations when a word or phrase is highlighted.

Bitches don't know my Socratic Paradox blogging skillz

Of course, everything is flipped to Microsoft's own tools by default. Mercifully, there's also a wider selection of services to chose from.

Tabs no longer broken

The new toys are nice, but arguably the most practical addition is an ability to quickly re-open tabs after they've been closed. Like most of what IE8 brings to the table, this is in no way a new function for most of today's browsers. But given it took Microsoft until IE7 to add tabs in the first place, we mustn't hold ourselves above cooing in delight over baby steps.

Oh good lord, finally

I simply don't understand people who don't use tabs. It's unnatural. But when one walks in the path of righteousness with tabs 'ablazing, there's bound to be a few that get closed by accident. Not offering the ability to quickly re-open tabs you've closed is inexcusable in a modern browser. Safari, I'm looking at you.

Fancy-pants Searching

IE's address bar now works like it does in Firefox 3, working not only as a place to enter a web site's URL, but functioning as a search bar that scours your RSS feeds and history.

The dedicated search bar on the upper right can also easily be customized to only retrieve results from a particular web site. For instance, entering The Register here:

Because we're worth it

Then you can search for this:

We don't recommend using Google to locate this Reg avian censorship story

Without requiring this:

Quite

®

Seven Steps to Software Security

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.