You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 13_browser.md
+5-3
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ There are a lot more rules about the way the requester can include more informat
42
42
43
43
{{index layering, stream, ordering}}
44
44
45
-
Most protocols are built on top of other protocols. HTTP treats the network as a streamlike device into which you can put bits and have them arrive at the correct destination in the correct order. Ensuring that on top of the primitive data-sending that the network gives you is already a rather tricky problem.
45
+
Most protocols are built on top of other protocols. HTTP treats the network as a streamlike device into which you can put bits and have them arrive at the correct destination in the correct order. Providing those guarantees that on top of the primitive data-sending that the network gives you is already a rather tricky problem.
46
46
47
47
{{index TCP}}
48
48
@@ -218,7 +218,7 @@ You can load ((ES modules)) (see [Chapter ?](modules#es)) in the browser by givi
Some attributes can also contain a JavaScript program. The `<button>` tag shown next (which shows up as a button) has an `onclick` attribute. The attribute's value will be run whenever the button is clicked.
221
+
Some attributes can also contain a JavaScript program. The `<button>` tag (which shows up as a button) supports an `onclick` attribute. The attribute's value will be run whenever the button is clicked.
222
222
223
223
```{lang: "html"}
224
224
<button onclick="alert('Boom!');">DO NOT PRESS</button>
@@ -244,7 +244,7 @@ The hard part of sandboxing is allowing the programs enough room to be useful ye
244
244
245
245
{{index leak, exploit, security}}
246
246
247
-
Every now and then, someone comes up with a new way to circumvent the limitations of a ((browser)) and do something harmful, ranging from leaking minor private information to taking over the whole machine that the browser runs on. The browser developers respond by fixing the hole, and all is well again—until the next problem is discovered, and hopefully publicized, rather than secretly exploited by some government agency or ((mafia)).
247
+
Every now and then, someone comes up with a new way to circumvent the limitations of a ((browser)) and do something harmful, ranging from leaking minor private information to taking over the whole machine that the browser runs on. The browser developers respond by fixing the hole, and all is well again—until the next problem is discovered, and hopefully publicized, rather than secretly exploited by some government agency or criminal organization.
248
248
249
249
## Compatibility and the browser wars
250
250
@@ -261,3 +261,5 @@ Mozilla ((Firefox)), a not-for-profit offshoot of ((Netscape)), challenged Inter
261
261
{{index compatibility}}
262
262
263
263
The new players had a more serious attitude toward ((standards)) and better ((engineering)) practices, giving us less incompatibility and fewer ((bug))s. Microsoft, seeing its market share crumble, came around and adopted these attitudes in its Edge browser, which replaces Internet Explorer. If you are starting to learn web development today, consider yourself lucky. The latest versions of the major browsers behave quite uniformly and have relatively few bugs.
264
+
265
+
Unfortunately, with Firefox's market share getting ever smaller, and Edge becoming just a wrapper around Chrome's core in 2018, this uniformity might once again take the form of a single vendor—Google, this time—having enough control over the browser market to push its idea of what the Web should look like onto the rest of the world.
0 commit comments