To fight against noise pollution in web pages, Google has added to the latest version of its Chrome browser a mute function. There is nothing worse than advertising hidden behind a tab that starts trumpeting his message or send an insipid music. To fight against this phenomenon of noise pollution which is growing on the Internet, Google had installed last November a function reducing these very intrusive ads in silence. This useful feature daily is now available in the latest stable version of Google Chrome. This function allows you to track the noisy tab with an icon representing a speaker to quickly identify the heckler. You ll also be able to know which tabs are using your webcam or Chromecast if the module is used with a TV with HDMI key Google. A sandbox more effective at blocking malware This update Google Chrome also comes with a tray function reinforced sand blocking the insidious download malicious files, while Windows 8 users will benefit from the Metro interface. Finally, G
http://www.bnxit.com/chrome-war-noisy-tabs/
Subscribe to:
Post Comments (Atom)
Archives
-
▼
2014
(50)
-
▼
January
(41)
- Microsoft might be forced (again) to change the na...
- Microsoft facilitates the management of accounts O...
- EverNote: Sync 4 times faster after upgrading its ...
- Mobile applications, the other target of the NSA
- Information Builders launches Skybox for BI projec...
- Oracle Big Data: tangible business value
- Cisco annual security report unprecedented from ad...
- Apple quarterly, 2014: Record sales but concern ab...
- Native Windows malware tries to infect Android dev...
- ESET obtained the first position of AV-Comparative...
- Thomson is going to demonstrate the virtues of the...
- What is expected from Windows 8.1 Update 1?
- How to detect if Google has penalized us?
- Personal data: in the cloud and in the land
- Chrome goes to war against noisy tabs
- Case Target: 11 GB of data sent to a Russian server
- Fujitsu Labs invented a method for searching encry...
- China reactive the creation of a national OS calle...
- More updates for XP, except for anti-virus
- Using WiFi, Fortinet offers to track customers in ...
- The creator of BitTorrent developing a steganograp...
- Blackphone the smartphone ultra-secure Silent Circ...
- Dell relies on a security offering end to end
- NSA hacks radio waves unconnected PC
- Do Green Data Centers Exist?
- Data Center Management Through Careful Environment...
- Data Center Consolidation - What You Should Know
- How to Take Data Center Secure Backup
- Cisco Data Center Security: Taking the Next Step i...
- What Are The Technology Trends For 2014?
- Unlocking Encryption - A Method of Data Security
- Cisco - How to configure an IKEv2 Site to Site IPS...
- ASA - VPN Traffic is not being encrypted (CSCsd48512)
- Zone Based Firewall ZBFW
- Designing VPC and Routing
- Cisco Flex Link
- Understanding Cisco Nexus 2000 Series Fabric Exten...
- Distributed Firewall
- Distributed Firewall - Statefull ??
- Virtual Firewall
- Physical Firewall
-
▼
January
(41)
© Copyright 2014 - Security Data Center. Simple theme. Powered by Blogger.
No comments:
Post a Comment