Feeds

Firefox 3.5.4 beta ready for bug testing, abuse

SeaMonkey 2.0 RC1 swims onto web

Choosing a cloud hosting partner with confidence

While Firefox testers can expect getting their mitts around the first public beta of Firefox 3.6 tomorrow, Mozilla still has the less-glamorous task of putting the browser's next security and stability update through some serious abuse.

On Monday, Mozilla trotted out Firefox 3.5.4 release candidate for testing on the non-profit's FTP servers. Venture here for the various OS flavors.

"Please hammer on these builds mercilessly to make sure that things work well! If you notice things that worked in previous Firefox 3.5.3 and does not work in this release, we would like to know about it *right away*," wrote Carsten Book, a software engineer working for the Mozilla QA Team.

Firefox 3.5.4 is mostly a maintenance exercise, lacking the reported performance gains that may entice folks to play around with version 3.6 when it hits. Never the less, the 3.5.4 release candidate is here now, ready to close its eyes and think of England.

Mozilla plans to have a final version of Firefox 3.5.4 next week, on October 21. That puts the code a day ahead of the official release of Windows 7.

Mozilla also pumped out this weekend its first release candidate of version 2.0 of SeaMonkey, the foundation's "all-in-one internet application suite."

SeaMonkey is the spiritual successor to the Netscape Communicator of olden days, when things like newsgroup support, email, an IRC client, and HTML editing were all baked into the browser. Thus, we see that time and space are circular.

"If we would release this RC as final, the release would be roughly a week after it," wrote Robert Kaiser, SeaMonkey project coordinator. "I expect that we'll have a second RC though with a number of assorted fixes, and I hope that one can become the actual final around October 21."

Downloads for SeaMonkey 2.0 RC1 are available here. Release notes are located yonder. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.