The following warnings occurred:
Warning [2] Undefined property: MyLanguage::$archive_pages - Line: 2 - File: printthread.php(287) : eval()'d code PHP 8.2.13 (Linux)
File Line Function
/inc/class_error.php 153 errorHandler->error
/printthread.php(287) : eval()'d code 2 errorHandler->error_callback
/printthread.php 287 eval
/printthread.php 117 printthread_multipage



CentBrowser Forum
Cent Browser 3.0.4.29(for Windows) Released - Printable Version

+- CentBrowser Forum (https://www.centbrowser.net/en)
+-- Forum: Product Related (https://www.centbrowser.net/en/forumdisplay.php?fid=1)
+--- Forum: Release Channel (https://www.centbrowser.net/en/forumdisplay.php?fid=2)
+--- Thread: Cent Browser 3.0.4.29(for Windows) Released (/showthread.php?tid=1793)

Pages: 1 2 3 4


RE: Cent Browser 3.0.4.29(for Windows) Released - Admini - 01-11-2018

(01-11-2018, 11:08 AM)David Wrote: I found a new problem, when I use the browser to watch Twitch live, there will be a certificate error, then when using Google Chrome does not appear this error

We can't reproduce this issue on our side, please check your extensions.(especially ad blocker)


RE: Cent Browser 3.0.4.29(for Windows) Released - Admini - 01-11-2018

(01-11-2018, 12:28 PM)reactor Wrote: http://xlab.tencent.com/special/spectre/spectre_check.html

We already knew it.
You can change "chrome://flags/#shared-array-buffer" to "Disabled" to bypass the test.


RE: Cent Browser 3.0.4.29(for Windows) Released - reactor - 01-11-2018

(01-11-2018, 04:19 PM)CentBrowser Wrote: We already knew it.
You can change "chrome://flags/#shared-array-buffer" to "Disabled" to bypass the test.

This only would stop a Javascript based attack.


https://repl.it/repls/DeliriousGreenOxpecker
If you can read the letter "The Magic Words are Squeamish Ossifrage." it means that theorically any website can steal your complete browser session with a few javascript. You log into your bank account, then you visit a rogue website = your credentials are stolen.



The other bug, Spectre, involves two known attack strategies so far, and is far more difficult to patch. (And in fact, it may be impossible to defend against it entirely in the long term without updating hardware.)
https://www.wired.com/story/meltdown-and-spectre-vulnerability-fix/

Sad


RE: Cent Browser 3.0.4.29(for Windows) Released - main user - 01-12-2018

When you plan to exit stably version 3.1...?


RE: Cent Browser 3.0.4.29(for Windows) Released - Admini - 01-12-2018

(01-12-2018, 05:31 AM)main user Wrote: When you plan to exit stably version 3.1...?

Maybe in three days.


RE: Cent Browser 3.0.4.29(for Windows) Released - karserasl - 01-15-2018

(01-11-2018, 04:45 PM)reactor Wrote: This only would stop a Javascript based attack.


https://repl.it/repls/DeliriousGreenOxpecker
If you can read the letter "The Magic Words are Squeamish Ossifrage." it means that theorically any website can steal your complete browser session with a few javascript. You log into your bank account, then you visit a rogue website = your credentials are stolen.



The other bug, Spectre, involves two known attack strategies so far, and is far more difficult to patch. (And in fact, it may be impossible to defend against it entirely in the long term without updating hardware.)
https://www.wired.com/story/meltdown-and-spectre-vulnerability-fix/

Sad

Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable.
If you want to check your PC, then download the code, compile it and run it on your system.

Second, we actually need a new update ASAP. https://xlab.tencent.com/special/spectre/spectre_check.html Confirms that Cent is vulnerable.


RE: Cent Browser 3.0.4.29(for Windows) Released - reactor - 01-16-2018

(01-15-2018, 06:10 PM)karserasl Wrote: Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable.
If you want to check your PC, then download the code, compile it and run it on your system.

Second, we actually need a new update ASAP. https://xlab.tencent.com/special/spectre/spectre_check.html Confirms that Cent is vulnerable.

https://www.grc.com/inspectre.htm


RE: Cent Browser 3.0.4.29(for Windows) Released - vladbsid - 01-17-2018

When will the stable version 3.1.x.xx come out?


RE: Cent Browser 3.0.4.29(for Windows) Released - user_99 - 01-17-2018

(01-15-2018, 06:10 PM)karserasl Wrote: Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable.
If you want to check your PC, then download the code, compile it and run it on your system.

Second, we actually need a new update ASAP. https://xlab.tencent.com/special/spectre/spectre_check.html Confirms that Cent is vulnerable.

With setting the flags this link show $ Your browser is NOT VULNERABLE to Spectre


RE: Cent Browser 3.0.4.29(for Windows) Released - AHMD - 01-17-2018

NEW VERSION
WHEN?
THANKS