Language Selection

English French German Italian Portuguese Spanish

The Best Google Chrome Extensions

Filed under
Google
Software

Google Chrome has finally added extensions to its bag of tricks. True, there are nowhere near as many extensions available for Google's Chrome 4 browser as there are for Mozilla's Firefox 3.6, but many of them already duplicate the better Firefox add-ons. Many, too, are little more than buttons that present mini, widget-like versions of Web apps, but I found plenty that added real functionality to Google Chrome. Check out my picks and see if they make Chrome-style browsing more to your taste. If they don't, one of the best things about Google Chrome's extensions is that they're incredibly easy to both install and uninstall: If the extension adds a button, a simple right-click lets you get rid of the offending extension.

IE Tab Classic

This is a great way for Web developers and general users alike to see if that page you're viewing looks the way it would in a browser every major site targets—Microsoft Internet Explorer. It can be handy, too, if Chrome doesn't like a page you want to view. Google's browser isn't infallible; it even mis-displays PCMag.com in minor ways: The "carousel" of images with links to hot stories doesn't show arrows on either side, the way it does in IE and Firefox. It's also very handy for sites like Outlook Webmail, which requires IE for full functionality. Unlike the other, more popular IETab extionsion, this one doesn't constantly pop up error messages, such as for scripting irregularities. It also lets you specify sites that should always use the IE page renderer.

Rest Here




More in Tux Machines

Software Freedom Conservancy Funding

  • Software Freedom Conservancy matching
    Non-profits that provide project support have proven themselves to be necessary for the success and advancement of individual projects and Free Software as a whole. The Free Software Foundation (founded in 1985) serves as a home to GNU projects and a canonical list of Free Software licenses. The Open Source Initiative came about in 1998, maintaining the Open Source Definition, based on the Debian Free Software Guidelines, with affiliate members including Debian, Mozilla, and the Wikimedia Foundation. Software in the Public Interest (SPI) was created in the late 90s largely to act as a fiscal sponsor for projects like Debian, enabling it to do things like accept donations and handle other financial transactions.
  • Clojars is Conservancy’s Newest Member Project
    Software Freedom Conservancy is pleased to announce the addition of Clojars as its newest member project. Clojars is a community-maintained repository for free and open source libraries written in the Clojure programming language. Clojars emphasizes ease of use, publishing library packages that are simple to use with build automation tools.

Leftovers: Software

  • systemd 233 about to be released, please help testing
    systemd 233 is scheduled to be released next week, and there is only a handful of small issues left. As usual there are tons of improvements and fixes, but the most intrusive one probably is another attempt to move from legacy cgroup v1 to a “hybrid” setup where the new unified (cgroup v2) hierarchy is mounted at /sys/fs/cgroup/unified/ and the legacy one stays at /sys/fs/cgroup/ as usual. This should provide an easier path for software like Docker or LXC to migrate to the unified hiearchy, but even that hybrid mode broke some bits.
  • Keep : A personal shell command keeper
    Introducing a new command line tool which solves the issue of memorizing commands or storing them somewhere which is difficult to find. With the grep and run commands, one can easily find their long forgotten commands and use them them right away.
  • qutebrowser v0.10.0 released
    I'm happy to annouce the release of qutebrowser v0.10.0! qutebrowser is a keyboard driven browser with a vim-like, minimalistic interface. It's written using PyQt and cross-platform. I haven't announced the v0.9.0 release in this blog (or any patch releases), but for v0.10.0 it definitely makes sense to do so, as it's mostly centered on QtWebEngine!
  • GNOME Pomodoro: A Pomodoro Timer With AppIndicator And GNOME Shell Support
    GNOME Pomodoro is, like the name suggests, a Pomodoro timer for GNOME. The application website mentions that it's currently only for GNOME Shell, however, an AppIndicator is also available.
  • 7 Awesome Open Source Build Automation Tools For Sysadmin/DevOps/Developers
    Build automation is a vital tool for devops, sysadmins, and developers. It is nothing but scripting or automating the process of compiling source code into binary. Sysadmins can use build tools to manage and update config files. Following is a list of awesome open source and popular tools associated with automating build processes on Linux or Unix-like system.

Android Leftovers

Security Leftovers

  • Major Cloudflare bug leaked sensitive data from customers’ websites
    Cloudflare revealed a serious bug in its software today that caused sensitive data like passwords, cookies, authentication tokens to spill in plaintext from its customers’ websites. The announcement is a major blow for the content delivery network, which offers enhanced security and performance for more than 5 million websites. This could have allowed anyone who noticed the error to collect a variety of very personal information that is typically encrypted or obscured.
  • SHA1 collisions make Git vulnerable to attakcs by third-parties, not just repo maintainers
    After sitting through an endless flood of headless-chicken messages on multiple media about SHA-1 being fatally broken, I thought I'd do a quick writeup about what this actually means.
  • Torvalds patches git to mitigate against SHA-1 attacks
    Linux creator Linus Torvalds says two sets of patches have been posted for the distributed version control system git to mitigate against SHA-1 attacks which are based on the method that Dutch and Google engineers detailed last week. The post by Torvalds detailing this came after reports emerged of the version control system used by the WebKit browser engine repository becoming corrupted after the two proof-of-concept PDF files that were released by the Dutch and Google researchers were uploaded to the repository.
  • Linus Torvalds on "SHA1 collisions found"
  • More from Torvalds on SHA1 collisions
    I thought I'd write an update on git and SHA1, since the SHA1 collision attack was so prominently in the news. Quick overview first, with more in-depth explanation below: (1) First off - the sky isn't falling. There's a big difference between using a cryptographic hash for things like security signing, and using one for generating a "content identifier" for a content-addressable system like git. (2) Secondly, the nature of this particular SHA1 attack means that it's actually pretty easy to mitigate against, and there's already been two sets of patches posted for that mitigation. (3) And finally, there's actually a reasonably straightforward transition to some other hash that won't break the world - or even old git repositories.
  • [Older] Wire’s independent security review
    Ever since Wire launched end-to-end encryption and open sourced its apps one question has consistently popped up: “Is there an independent security review available?” Well, there is now!
  • Malware Lets a Drone Steal Data by Watching a Computer’s Blinking LED
  • FCC to halt rule that protects your private data from security breaches
    The Federal Communications Commission plans to halt implementation of a privacy rule that requires ISPs to protect the security of its customers' personal information. The data security rule is part of a broader privacy rulemaking implemented under former Chairman Tom Wheeler but opposed by the FCC's new Republican majority. The privacy order's data security obligations are scheduled to take effect on March 2, but Chairman Ajit Pai wants to prevent that from happening. The data security rule requires ISPs and phone companies to take "reasonable" steps to protect customers' information—such as Social Security numbers, financial and health information, and Web browsing data—from theft and data breaches. "Chairman Pai is seeking to act on a request to stay this rule before it takes effect on March 2," an FCC spokesperson said in a statement to Ars.
  • Google releases details of another Windows bug
  • How to secure the IoT in your organisation: advice and best practice for securing the Internet of Things
    All of the major technology vendors are making a play in the Internet of Things space and there are few organisations that won’t benefit from collecting and analysing the vast array of new data that will be made available. But the recent Mirai botnet is just one example of the tremendous vulnerabilities that exist with unsecured access points. What are the main security considerations and best practices, then, for businesses seeking to leverage the potential of IoT?