Quote
adodupan
I need a little help about pref panel. If someone can explain what to expect when i change some settings, or better yet, where i can do a test to see the effect.
1. Page Display > General > Disable marquee element
2. Browsing > Window Diversion > Links meant to open a new window
3. Browsing > Window Diversion > Open diverted windows in background
4. Browsing > Tabbed Browsing > Tab Bar > Attach Tab/Window Buttons to the tab bar
5. Privacy & Security > Encryption > Encrypted Transmission > I need help about all options here...
<table width="100%" cellpadding="2" border="1"> <tr><td width="25%">Marquee display was at fault with 0.6?</td><td width="75%"><marquee>The text here in this table segemnt should scroll horizontally in the marquee effect.</marquee></td></tr> <tr><td width="25%">Marquee display behavior="alternate"</td><td width="75%"><marquee behavior="alternate">The text here in this table segement alternates in the marquee effect.</marquee></td></tr> <tr><td width="25%">Marquee display scrollamount="50"</td><td width="75%"><marquee scrollamount="50" scrolldelay="5">The text here in this table segement is fast in the marquee effect.</marquee></td></tr> </table>
Tab/&Window Buttons(24,24){ # Prev{ # %ifplugin tabs # ID_TAB_PREV|Prev # Previous Tab. Right-click for more options. # %else # ID_WINDOW_PREV|Prev # Previous Window. Right-click for more options. # %endif # tabhot.bmp[0] # tabcold.bmp[0] # } # Next{ # %ifplugin tabs # ID_TAB_NEXT|Next # Next Tab. Right-click for more options. # %else # ID_WINDOW_NEXT|Next # Next Window. Right-click for more options. # %endif # tabhot.bmp[1] # tabcold.bmp[1] # } # - New{ %ifplugin tabs ID_NEW_TAB|New New Tab. Right-click for more options. %else ID_NEW_BROWSER New Window %endif tabhot.bmp[2] tabcold.bmp[2] } Close{ %ifplugin tabs ID_CLOSE_TAB|Close Close Tab. Right-click for more options. %else ID_FILE_CLOSE|Close Close Window. Right-click for more options. %endif tabhot.bmp[3] tabcold.bmp[3] } }
Quote
guenter
You all beat me I was too slow. I had started before You but searched the old links and codes.
Quote
JohnHell
Quote
guenter
You all beat me I was too slow. I had started before You but searched the old links and codes.
I would be slower as I thought of make a html page with all the examples
@adodupan, and for all, what do you see in the Encrypted Transmission tab?
I found that the 2 options available to me weren't triggering when they should and I created a new profile to see if there was an issue, but I found that in the new profile all checkmarks/options were unavailable :-?
Does it happen to you too?
Are those options even working?
I was trying to trigger the two options I have available, the one to warn when sending a form from unencrypted to unencrypted (@adodupan, this is when you make use of a search box in a non-ssl page, for example) and wasn't triggering; and the one that warns of unencrypted content in an encrypted page and wasn't working either (@adodupan, when the url bar becomes reddish and the locker at the bottom is broken).
Quote
George Hall
Quote
JohnHell
Quote
guenter
You all beat me I was too slow. I had started before You but searched the old links and codes.
I would be slower as I thought of make a html page with all the examples
@adodupan, and for all, what do you see in the Encrypted Transmission tab?
I found that the 2 options available to me weren't triggering when they should and I created a new profile to see if there was an issue, but I found that in the new profile all checkmarks/options were unavailable :-?
Does it happen to you too?
Are those options even working?
I was trying to trigger the two options I have available, the one to warn when sending a form from unencrypted to unencrypted (@adodupan, this is when you make use of a search box in a non-ssl page, for example) and wasn't triggering; and the one that warns of unencrypted content in an encrypted page and wasn't working either (@adodupan, when the url bar becomes reddish and the locker at the bottom is broken).
I found that if adblockplus.js in the default preferences when using Firefox Adblock Olus Extension some of the view Toolbars items are missing when in a new profile addblock add to extensions folder in your default profile.
Whe I deleted adblockplus.js or startupCache they came back.
So a single file make can make options you check disappear.
Quote
guenter
Maybe have a look at the SeaMonkey Options. Password, Master password and SSL.
They look almost identical to K-Meleons. Call that SSL Window into our Encyption Settings window if possible?
Quote
adodupan
JohnHell, JamesD, open any 1.8 build, open folder defaults\pref or defaults\preferences,
then just paste file security-prefs.js to your km. After that i expect your help.
Quote
guenter
Maybe have a look at the SeaMonkey Options. Password, Master password and SSL.
They look almost identical to K-Meleons. Call that SSL Window into our Encyption Settings window if possible?
guenter, i'm not sure i understood your message (bolded).
I'm going to try your examples, i will answer you soon.
<treeitem id="sslItem" label="&ssl.label;" prefpane="ssl_pane" url="chrome://pippki/content/pref-ssl.xul" helpTopic="ssl_prefs"/>
<!DOCTYPE overlay
<treecell url="chrome://kmprefs/content/pref-encryption.xul" label="&encryption.label;"/>
Quote
adodupan
JohnHell, JamesD, open any 1.8 build, open folder defaults\pref or defaults\preferences,
then just paste file security-prefs.js to your km. After that i expect your help.
Quote
adodupan
guenter, what is your message? Do you want to see some new options in km's panel?
JohnHell, i have a similar observation.
Quote
JohnHell
I think it is useless. They don't trigger when they should
snip...
But looks like in K-meleon 74 they aren't working the prefs. At least they don't trigger the warnings.
Quote
guenter
Yes. I also think it does not work properly. Is it only the interface?
But how can we test?
Quote
guenter
Quote
JohnHell
I think it is useless. They don't trigger when they should
snip...
But looks like in K-meleon 74 they aren't working the prefs. At least they don't trigger the warnings.
BTW: They do not exist in all test versions. Have You checked that they exist?
Quote
guenter
Yes. I also think it does not work properly. Is it only the interface?
But how can we test?
p.s. Maybe call that overlay which should basically work via a kml? If needed IMHO it can be loaded inside pref-certs.xul or a cut down version of it. Or another file that can host the overlay.
Else temper with about:config with the 5 values of security.warn_ ... an test on different pages?
Quote
adodupan
Quote
guenter
Yes. I also think it does not work properly. Is it only the interface?
But how can we test?
p.s. Maybe call that overlay which should basically work via a kml? If needed IMHO it can be loaded inside pref-certs.xul or a cut down version of it. Or another file that can host the overlay.
Else temper with about:config with the 5 values of security.warn_ ... an test on different pages?
No guenter, only thing is for sure, not a problem with the interface (xul code is not broken).
It seems that these preferences removed from ff, i can not find them in esr code.
JohnHell that's it, i got what i needed.
guenter, thanks for the tip, it's a great tip
Regards to all
// Name of alternate about: page for certificate errors (when undefined, defaults to about:neterror) pref("security.alternate_certificate_error_page", "certerror"); pref("security.warn_entering_secure", false); pref("security.warn_leaving_secure", false); pref("security.warn_submit_insecure", false); pref("security.warn_viewing_mixed", true); pref("security.warn_mixed_active_content", true); pref("security.warn_mixed_display_content", false); // Block insecure active content on https pages pref("security.mixed_content.block_active_content", true); // Turn on the CSP 1.0 parser for Content Security Policy headers pref("security.csp.speccompliant", true);
pref("security.enable_ssl2", false); pref("security.enable_ssl3", true); pref("security.enable_tls", true); pref("security.ssl2.des_64", false); pref("security.ssl2.des_ede3_192", false); pref("security.ssl2.rc2_128", false); pref("security.ssl2.rc2_40", false); pref("security.ssl2.rc4_128", false); pref("security.ssl2.rc4_40", false); pref("security.ssl3.dhe_dss_des_sha", false); pref("security.ssl3.dhe_rsa_des_sha", false); pref("security.ssl3.ecdh_ecdsa_null_sha", false); pref("security.ssl3.ecdh_rsa_null_sha", false); pref("security.ssl3.ecdhe_ecdsa_null_sha", false); pref("security.ssl3.ecdhe_rsa_null_sha", false); pref("security.ssl3.rsa_1024_des_cbc_sha", false); pref("security.ssl3.rsa_1024_rc4_56_sha", false); pref("security.ssl3.rsa_des_sha", false); pref("security.ssl3.rsa_fips_des_sha", false); pref("security.ssl3.rsa_null_md5", false); pref("security.ssl3.rsa_null_sha", false); pref("security.ssl3.rsa_rc2_40_md5", false); pref("security.ssl3.rsa_rc4_40_md5", false); pref("security.warn_entering_secure", false); pref("security.warn_entering_weak", true); pref("security.warn_leaving_secure", false); pref("security.warn_submit_insecure", false); pref("security.warn_viewing_mixed", true);
Quote
adodupan
3. Browsing > Window Diversion > Open diverted windows in background
Quote
Dorian
Those prefs doesn't exist anymore, so I suppose I can remove the panel
Quote
Moziilazine
Both security.tls.version.min and security.tls.version.max can currently range from 0 to 3, which will be extended once further protocol versions are supported. Together, the two preferences specify the range of protocols which are supported:
security.tls.version.min specifies the minimum required protocol version (thus, the lowest version allowed to fall back to when higher versions are not available).
security.tls.version.max specifies the maximum supported protocol version (thus, the highest version to initiate a connection with before falling back to lower versions).
If security.tls.version.min and security.tls.version.max are equal, only one protocol version will be supported. The behavior is undefined if security.tls.version.min is larger than the security.tls.version.max value.
[edit]
0
SSL 3.0 is the minimum required / maximum supported encryption protocol. (This is the current default for the minimum required version.)
[edit]
1
TLS 1.0 is the minimum required / maximum supported encryption protocol. (This is the current default for the maximum supported version.)
[edit]
2
TLS 1.1 is the minimum required / maximum supported encryption protocol.
[edit]
3
TLS 1.2 is the minimum required / maximum supported encryption protocol. (Not supported in Firefox 23.0 and SeaMonkey 2.20.)
<prefpane id="ssl_pane" label="&pref.ssl.title;" script="chrome://pippki/content/pref-ssl.js"> <preferences id="ssl_preferences"> <preference id="security.tls.version.min" name="security.tls.version.min" type="int"/> <preference id="security.tls.version.max" name="security.tls.version.max" type="int"/> <preference id="security.warn_entering_secure" name="security.warn_entering_secure" type="bool"/> <preference id="security.warn_leaving_secure" name="security.warn_leaving_secure" type="bool"/> <preference id="security.warn_submit_insecure" name="security.warn_submit_insecure" type="bool"/> <preference id="security.warn_viewing_mixed" name="security.warn_viewing_mixed" type="bool"/> <preference id="security.warn_mixed_active_content" name="security.warn_mixed_active_content" type="bool"/> <preference id="security.mixed_content.block_active_content" name="security.mixed_content.block_active_content" type="bool"/> <preference id="security.warn_mixed_display_content" name="security.warn_mixed_display_content" type="bool"/> <preference id="security.mixed_content.block_display_content" name="security.mixed_content.block_display_content" type="bool"/> </preferences> <groupbox align="start"> <caption label="&SSLProtocolVersions.caption;"/> <description>&limit.description;</description> <hbox align="center"> <label id="allowEnable" value="&limit.enable.label;"/> <checkbox id="allowSSL30" class="nogray-disabled" label="&limit.ssl30.label;" accesskey="&limit.ssl30.accesskey;" oncommand="UpdateSslPrefs();"/> <checkbox id="allowTLS10" class="nogray-disabled" label="&limit.tls10.label;" accesskey="&limit.tls10.accesskey;" oncommand="UpdateSslPrefs();"/> <checkbox id="allowTLS11" class="nogray-disabled" label="&limit.tls11.label;" accesskey="&limit.tls11.accesskey;" oncommand="UpdateSslPrefs();"/> <checkbox id="allowTLS12" class="nogray-disabled" label="&limit.tls12.label;" accesskey="&limit.tls12.accesskey;" oncommand="UpdateSslPrefs();"/> </hbox> </groupbox> <groupbox align="start"> <caption label="&SSLWarnings.caption;"/> <description>&warn.description2;</description> <checkbox id="warnEnteringSecure" label="&warn.enteringsecure;" accesskey="&warn.enteringsecure.accesskey;" preference="security.warn_entering_secure"/> <checkbox id="warnLeavingSecure" label="&warn.leavingsecure;" accesskey="&warn.leavingsecure.accesskey;" preference="security.warn_leaving_secure"/> <checkbox id="warnInsecurePost" label="&warn.insecurepost;" accesskey="&warn.insecurepost.accesskey;" preference="security.warn_submit_insecure"/> <checkbox id="warnViewMixed" label="&warn.viewmixed;" accesskey="&warn.viewmixed.accesskey;" preference="security.warn_viewing_mixed" checked="true"/> </groupbox> <groupbox align="start"> <caption label="&SSLMixedContent.caption;"/> <checkbox id="warnMixedActiveContent" label="&warn.mixedactivecontent;" accesskey="&warn.mixedactivecontent.accesskey;" preference="security.warn_mixed_active_content"/> <checkbox id="blockActiveContent" label="&block.activecontent;" accesskey="&block.activecontent.accesskey;" preference="security.mixed_content.block_active_content"/> <checkbox id="warnMixedDisplayContent" label="&warn.mixeddisplaycontent;" accesskey="&warn.mixeddisplaycontent.accesskey;" preference="security.warn_mixed_display_content"/> <checkbox id="blockDisplayContent" label="&block.displaycontent;" accesskey="&block.displaycontent.accesskey;" preference="security.mixed_content.block_display_content"/> </groupbox> This JS code belongs to it. /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ function Startup() { // array associating XUL element IDs with preference values [0,1,2,3] gSslPrefElementIds = ["allowSSL30", "allowTLS10", "allowTLS11", "allowTLS12"]; // initial setting of checkboxes based on preference values UpdateSslBoxes(); } function UpdateSslBoxes() { // get minimum and maximum allowed protocol and locked status let minVersion = document.getElementById("security.tls.version.min").value; let maxVersion = document.getElementById("security.tls.version.max").value; let minLocked = document.getElementById("security.tls.version.min").locked; let maxLocked = document.getElementById("security.tls.version.max").locked; // set checked, disabled, and locked status for each protocol checkbox for (index = 0; index < gSslPrefElementIds.length; index++) { let currentBox = document.getElementById(gSslPrefElementIds[index]); currentBox.checked = index >= minVersion && index <= maxVersion; if ((minLocked && maxLocked) || (minLocked && index <= minVersion) || (maxLocked && index >= maxVersion)) { // boxes subject to a preference's locked status are disabled and grayed currentBox.removeAttribute("nogray"); currentBox.disabled = true; } else { // boxes which the user can't uncheck are disabled but not grayed currentBox.setAttribute("nogray", "true"); currentBox.disabled = (index > minVersion && index < maxVersion) || (index == minVersion && index == maxVersion); } } } function UpdateSslPrefs() { // this is called whenever a checkbox changes let minVersion = -1; let maxVersion = -1; // find the first and last checkboxes which are now checked for (index = 0; index < gSslPrefElementIds.length; index++) { if (document.getElementById(gSslPrefElementIds[index]).checked) { if (minVersion < 0) // first box checked minVersion = index; maxVersion = index; // last box checked so far } } // if minVersion is valid, then maxVersion is as well -> update prefs if (minVersion >= 0) { document.getElementById("security.tls.version.min").value = minVersion; document.getElementById("security.tls.version.max").value = maxVersion; } // update checkbox values and visibility based on prefs again UpdateSslBoxes(); }
Quote
Dorian
Those prefs doesn't exist anymore, so I suppose I can remove the panel
Quote
guenter
Took some courage and tried myself.
Quote
JamesD
According to DuckDuckGo, this site is a test for mixed content.
https://people.mozilla.org/~tvyas/mixedcontent.html
I have not changed to the code that guenter included yet. I just get the number "9" in messages so far.
Edit: With new code, I got no alerts, and the last page did not display.
Quote
adodupan
rodocop, your word and your approval is enough for me
Dorian, yes.
Quote
guenter
Took some courage and tried myself.
You have only interface code, now you need a code that 'will do something'.
Take a little more courage and write a code that you need.
Regards
Quote
adodupan
Is it possible to change the color of main menu text (File, Edit, View...)?
/* * Edit this file and copy it as userChrome.css into your * profile-directory/chrome/ */ /* * This file can be used to customize the look of Mozilla's user interface * You should consider using !important on rules which you want to * override default settings. */ /* * Do not remove the @namespace line -- it's required for correct functioning */ @namespace url("http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" /* set default namespace to XUL */ /* * Some possible accessibility enhancements: */ /* * Make all the default font sizes 20 pt: * * * { * font-size: 20pt !important * } */ /* * Make menu items in particular 15 pt instead of the default size: * * menupopup > * { * font-size: 15pt !important * } */ /* * Give the Location (URL) Bar a fixed-width font * * #urlbar { * font-family: monospace !important; * } */ /* * Eliminate the throbber and its annoying movement: * * #throbber-box { * display: none !important; * } */ /* * For more examples see http://www.mozilla.org/unix/customizing.html */