of page 6 - Dave's Blog

Search
My timeline on Mastodon

Tweet from David Risney

2016 Jun 10, 3:24
@ericlaw So... he doesn't support HTTP2 yet?
PermalinkComments

Tweet from Windows Blogs

2016 Jun 10, 3:01
Using Device Portal to view debug logs for UWP http://blogs.windows.com/buildingapps/2016/06/10/using-device-portal-to-view-debug-logs-for-uwp/ 
PermalinkComments

Tweet from Philip II

2016 Jun 9, 9:01
Silly Queen Elizabeth thinks her nation secure from our Spanish Armada. We will soon see @lizbet1533 in chains. No naval power. Sad!
PermalinkComments

Tweet from David Risney

2016 Jun 9, 4:02
Movie written by algorithm turns out to be hilarious and intense http://arstechnica.com/the-multiverse/2016/06/an-ai-wrote-this-movie-and-its-strangely-moving/ 
PermalinkComments

Tweet from David Risney

2016 Jun 9, 3:48
Is this how we find out who Trump wants as his VP? https://twitter.com/7im/status/740670716870156288 
PermalinkComments

Tweet from David Risney

2016 Jun 9, 3:26
Trying to avoid regulation? Put a gun on it. You can't regulate that! http://arstechnica.com/tech-policy/2016/06/man-who-built-gun-drone-flamethrower-drone-argues-faa-cant-regulate-him/ 
PermalinkComments

Tweet from Rossen Atanassov

2016 Jun 8, 2:59
I recall meetings when we discussed pursuing WebGL... Now we're going open source with it :) https://github.com/MicrosoftEdge/WebGL 
PermalinkComments

Tweet from David Risney

2016 Jun 7, 9:06
@gregwhitworth @alialvi We were all confused because we for sure didn't think they would just be that annoying =)
PermalinkComments

Tweet from gregwhitworth

2016 Jun 7, 1:43
Dear @google, please store my answer to this question so I don't see this every time I start a browser session.
PermalinkComments

Tweet from David Risney

2016 Jun 6, 10:37
History & design of the biohazard symbol ☣: http://99percentinvisible.org/article/biohazard-symbol-designed-to-be-memorable-but-meaningless/  Creator sends angry letter over sartorial usage
PermalinkComments

Tweet from The A.V. Club

2016 Jun 6, 4:50
BuzzFeed backs out of RNC ad deal, citing profound awfulness of Donald Trump http://avc.lu/1t2uiEN 
PermalinkComments

Tweet from David Risney

2016 Jun 5, 4:18
@FremyCompany Edge is all about the pawn promotion
PermalinkComments

Tweet from David Risney

2016 Jun 5, 4:10
I played Chrome, Edge, FF & IE against each other in WebDriverChess. Edge just beats out Firefox for #1. Results: https://github.com/david-risney/webDriverChess/#browser-face-off 
PermalinkComments

Tweet from David Risney

2016 Jun 5, 4:00
@FremyCompany It uses https://github.com/nmrugg/stockfish.js  the asm.js port of the StockFish chess AI (the asm.js part is why Edge wins)
PermalinkComments

Tweet from David Risney

2016 Jun 5, 3:55
I finished WebDriverChess https://github.com/david-risney/webDriverChess/ : Two webdriver supporting browsers play a friendly game of chess. pic.twitter.com/axs92w3uF6
PermalinkComments

Tweet from Eric Lawrence

2016 Jun 2, 10:32
Chrome relaxes IDN display of Punycode (old restrictions were like IE) to match Firefox instead: https://bugs.chromium.org/p/chromium/issues/detail?id=336973#c34 
PermalinkComments

Windows Store App WebView Cross Origin XMLHttpRequest Behavior

2016 Jun 2, 6:45

TL;DR: Web content in a JavaScript Windows Store app or WebView in a Windows Store app that has full access to WinRT also gets to use XHR unrestricted by cross origin checks.

By default web content in a WebView control in a Windows Store App has the same sort of limitations as that web content in a web browser. However, if you give the URI of that web content full access to WinRT, then the web content also gains the ability to use XMLHttpRequest unrestricted by cross origin checks. This means no CORS checks and no OPTIONS requests. This only works if the web content's URI matches a Rule in the ApplicationContentUriRules of your app's manifest and that Rule declares WindowsRuntimeAccess="all". If it declares WinRT access as 'None' or 'AllowForWebOnly' then XHR acts as it normally does.

In terms of security, if you've already given a page access to all of WinRT which includes the HttpRequest class and other networking classes that don't perform cross origin checks, then allowing XHR to skip CORS doesn't make things worse.

PermalinkCommentsjavascript uwa uwp web webview windows winrt xhr

Tweet from David Risney

2016 Jun 2, 4:40
Answering the important questions: Tab v Spaces https://ukupat.github.io/tabs-or-spaces/  Broken down by programming language & using GitHub as population
PermalinkComments

Tweet from David Risney

2016 Jun 1, 1:51
Cool JS image diff'ing including browser webcam based demos https://twitter.com/lonekorean/status/737630487913455616 
PermalinkComments

Tweet from Sampson

2016 May 21, 11:33
Awesome—ScreenToGIF 2 is out! Lets you record a portion of your screen, edit afterwards, and export as animated GIF. https://screentogif.codeplex.com/releases/view/621383 
PermalinkComments
Older EntriesNewer Entries Creative Commons License Some rights reserved.