Microsoft Internet Explorer 8 RC1 Improves Security - InformationWeek
IoT
IoT
Government // Enterprise Architecture
News
1/27/2009
03:07 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Internet Explorer 8 RC1 Improves Security

Updates include architectural changes that mirror features found in Google's Chrome, Apple's Safari, and Mozilla's Firefox.

Microsoft has released Microsoft Internet Explorer 8 RC1, a near-final version of its new Web browser that's stable enough for widespread public testing.

Assuming that no show-stopping bugs or significant vulnerabilities are identified between now and whenever Microsoft is planning to offer the official release of Internet Explorer 8, RC1 represents the final form of Microsoft's browser, at least until the next revision.

Internet Explorer 8 has some catching up to do. Its global market share, according to Net Applications, is just 0.82%, compared with Google Chrome (all versions) at 1.04%, Mozilla Firefox (all versions) 21.34%, and Apple Safari (all versions) 7.93%.

The various versions of Microsoft Internet Explorer have 68.15% of the global browser market, down from 91.27% in 2004.

Among IE8's selling points are various safety and security improvements. These include architectural changes that put Web pages in separate processes, privacy enhancements, and online safety measures.

Microsoft has referred to IE8's architectural changes using the term "Loosely-Coupled IE," or "LCIE." In Internet Explorer 7, with a few exceptions, each browser window had its own process. But tabs, toolbar extensions, browser helper objects, and ActiveX controls also were managed by the same process. Thus, a crash in any part of this system could crash the browser.

In a move away from monolithic browser architecture, IE8's loosely coupled system puts tabs in separate processes, which in theory leads to better browser stability and less susceptibility to potential exploits. Google's Chrome browser also takes this approach, through in addition to running tabs on separate processes, it also gives plug-ins separate processes.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll