Anzeigen der neuesten Beiträge
0 Mitglieder und 9 Gäste betrachten dieses Thema.
- Implement issue 2058: Code View should be able to show resizable image.- Implement issue 2038: Spellcheck "change selected word to" should remember sorting order.- Implement issue 2043: Spellcheck should allow case-insensitive sorting.- Implement issue 2029: Save and open should warn if HTML files are not well formed.- Implement issue 2009: Add semantic tags to filenames in reports.- Implement issue 2028: Special characters should work in non-html files.- Implement issue 2027: Upgrade Boost to Boost 1.53.0.- Fix issue 2069: Work around for archives where filenames are not utf-8 encoded.- Fix issue 2068: ZIP general purpose bit 11 (utf-8) filename not set.- Fix issue 2061: Language code using wrong character to separate country code.- Fix issue 2057: Text selected across lines using Ctrl-F cannot be found with Find.- Fix issue 2036: Mark for Index can insert HTML tags into code making it invalid.- Fix issue 2041: Preview does not sync cursor after using Sigil for a while.- Fix issue 2030: The   character is incorrectly converted to space on open.- Fix issue 2035: Index Editor entries with nbsp character don't match text.- Fix issue 2016: Find with wrap off and All HTML Files still wraps on last file.- Fix issue 2001: Spellcheck does not always highlight a word the first time.- Fix issue 2017: Clips pasted into some windows does not work correctly.- Fix issue 2008: Index adds extra comma in some cases.
Stinger Release NotesBuild Number: 10.2.0.1014Build Date: 07-Mar-2013Stinger 32bit MD5: D19C5B952403431D2EBC254161D24238 SHA1: FE3966848DAF30A6537CE8CB8BC19D8F4725A4D2Stinger-ePO 32bit MD5: 904e393a6c5969f77647300bd6fd1499 SHA1: d5432fba712dfb1349a9d47ab36677ce0b22ea75Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• JS/Exploit-Blacole.kt• JS/Exploit-Blacole.ku• JS/Exploit-Blacole.kvEnhanced Detections:• DNSChanger.cw• Exploit-CVE2010-0188• Exploit-CVE2011-3544• Exploit-CVE2012-0158• Exploit-CVE2012-0507• FakeAlert-SysDef.ay• Generic Downloader.z• Generic FakeAlert.bw• JS/Blacole-Exploit• JS/Exploit-Blacole.eq• JS/Exploit-Blacole.gq• JS/Exploit-Blacole.ht• JS/Exploit-Blacole.ix• JS/Exploit-Blacole.kf• JS/Exploit-Blacole.kg• JS/Exploit-Blacole.kh• JS/Exploit-Blacole.ki• JS/Exploit-Blacole.kj• JS/Exploit-Blacole.kk• JS/Exploit-Blacole.kl• PWS-Zbot• PWS-Zbot.gen.apc• PWS-Zbot.gen.arj• PWS-Zbot.gen.arw• PWS-Zbot.gen.ary• W32/Autorun.worm.aaeh• W32/Autorun.worm.c• W32/DNSChanger.cw• ZeroAccess• ZeroAccess.hr
The Beta channel has been updated to 26.0.1410.28 for Windows, Mac, Linux, and Chrome Frame. This build contains the following: Updated Flash to new beta version of Flash 11.6.602.177, includes ActionScript Workers feature. Fixed the way apps appear in new tab page. [Issue: 175377] Fixed a crash while clicking "Install to play offline" button. [Issue: 178036] Fixed prerender of a page when a original prerender was cancelled. [Issue: 178755] Fixed an issue where some avatar icons are shown mirrored in tab strip. [Issue: 178397] Fixed ~60% regression in Cookie.TimeLoadDBQueueWait on Mac and Windows. [Issue: 175415] [Windows] Fixed a crash when installing the app launcher (and the first packaged app). [Issue: 178487] [Chrome Frame] Fixed a crash when trying to process a target="_blank" link. [Issue: 178415] Fixed stability crashes [Issues: 167510, 165952, 177659, 177843]Full details about what changes are in this build are available in the SVN revision log.
Stinger Release NotesBuild Number: 10.2.0.1015Build Date: 08-Mar-2013Stinger 32bit MD5: 9F4AD3BECE7D14BA6922F6DC8125F9CA SHA1: F0182ACA7F7AF89BBA2F01B224F0A2F05B00802FStinger-ePO 32bit MD5: c0c6f94ae5c1c97acdcfaf743686d02f SHA1: f515bbf39b94056bfaaf4dd47a598e4a93d59581Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• JS/Exploit-Blacole.ko• JS/Exploit-Blacole.ku• JS/Exploit-Blacole.kv• JS/Exploit-Blacole.kwEnhanced Detections:• DNSChanger.cw• Exploit-CVE2010-0188• Exploit-CVE2011-3544• Exploit-CVE2012-0158• Exploit-CVE2012-0507• Generic Downloader.z• Generic FakeAlert.bw• JS/Blacole-Exploit• JS/Exploit-Blacole.gq• JS/Exploit-Blacole.kf• JS/Exploit-Blacole.kl• JS/Exploit-Blacole.km• JS/Exploit-Blacole.kn• JS/Exploit-Blacole.kp• JS/Exploit-Blacole.kt• JS/Exploit-Blacole.ku• JS/Exploit-Blacole.kv• PWS-Zbot.gen.arj• PWS-Zbot.gen.arw• PWS-Zbot.gen.ary• TDSS.ag• TDSS.ap• W32/Autorun.worm.c• W32/DNSChanger.cw• ZeroAccess• ZeroAccess.eu• ZeroAccess.hr