DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, July 21, 2013

Browser Comparison 2

Posted on 4:56 PM by Unknown













This test was to determine many of the basic parameters of browsers display, and security vulnerabilities. The above image shows a test by NSS labs and shows the malware blocked by the most common browsers. The above images do not show the vulnerabilities of the browsers.

Internet Explorer Version 10.0.9200.16599

HTML 5 Test: 320
Acid 3 Test: pass*
CSS 3 Test: 54%
Speed Test: 30 ms
Security Test: 14/17
Ram Usage: 49 Mb
File Size:

Google Chrome Version 28.0.1500.71 

HTML 5 Test: 463
Acid 3 Test: pass
CSS 3 Test: 65%
Speed Test: 30ms*
Security Test: 16/17
Ram Usage: 45.7
File Size: 364.26 Mb

Firefox Version 22

HTML 5 Test: 410
Acid 3 Test: pass
CSS 3 Test: 63%
Speed Test: 31
Security Test: 13/17
Ram Usage: 83.2 Mb
File Size: 46.39 Mb

Chrome Canary Version 30.0.1557.0 canary

HTML 5 Test: 463
Acid 3 Test: pass
CSS 3 Test: 66
Speed Test: 30
Security Test: 16/17
Ram Usage: 65 Mb
File Size: 375.99 Mb

Opera Version 15.0.1147.130

HTML 5 Test: 423
Acid 3 Test: pass
CSS 3 Test: 65%
Speed Test: 30
Security Test: 15/17
Ram Usage: 70 Mb
File Size: 93 Mb

Maxthon Cloud Version 4.0.6.2000

HTML 5 Test: 476 ??
Acid 3 Test: fail
CSS 3 Test: 62%
Speed Test: 31ms
Security Test: 14/17
Ram Usage: 51 Mb
File Size: 87.73

Safari 5.1.7
HTML 5: 278
Acid 3: Test fail
CSS 3: 51%
Speed Test: 41ms
Security Test: 14/17

The question marks next to the Maxthon browsers html test question the companies past history of bribing the test givers. Maxthon has been known to bribe their testers to give them a higher score which is why they get a lower score.
Email ThisBlogThis!Share to XShare to Facebook
Posted in internet | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Gaming Communities
    Many gamers out there are looking for quality content and are looking to get their name out there. Now what if I said I found a website that...
  • What Is Adware
    Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
  • What Is Quick Scoping
    Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
  • Which Internet Browser Should I Use
    Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
  • Youtube Monetization Not Available In Your Country
    As we all know today thousands maybe millions of users are not able to monetize their newly submitted videos. Now Google at the time of this...
  • Free Online Classes
    Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
  • Tera Sorcerer Skill List
    Before I go into the full skill list let me break down what the sorcerer is. The sorcerer in Tera is a character of mass destruction. They a...
  • Black Ops 2 Review
    Black-ops 2 is another game in the well known Call of Duty series. This game is a lot like all the other games it has multiplayer, and it is...
  • Internet Browser Test Results
    From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
  • List Of Second Opinon Malware Scanners
    Why Do I Need A Secondary  Malware  Scanner? You want a secondary scanner because no 1 antivirus program can keep you safe from every threat...

Categories

  • 2013
  • 2013 Total Security
  • Android
  • Anti-Virus
  • antivirus
  • Apple
  • Asynchrony
  • Bitdefender
  • Bitdefender Wallet
  • Blackberry
  • Car dealership
  • cloud storage
  • CNET
  • Computer Support
  • computers
  • coupons
  • CX
  • Data loss
  • Direct selling
  • Download
  • Editor's Choice
  • forums
  • free software
  • Gamer
  • gaming
  • general
  • Google
  • HTML
  • internet
  • Internet access
  • ios 6 jailbreak
  • iOS 6.1 Jailbreak Tweaks
  • Jumpshot
  • LeBron James
  • Linux
  • Loader (computing)
  • loading
  • malware
  • malware encyclopedia
  • Miami Heat
  • Microsoft
  • Mobile security
  • Nokia
  • PageSpeed
  • Personal computer
  • Play Station 4
  • Product Reviews
  • Program
  • Programming
  • science
  • Searching
  • security
  • Servers
  • Shareware
  • SONY
  • technology
  • Tesla
  • Tesla Motors
  • top 5 ios
  • top 5 ios 6 cydia tweaks
  • Trade
  • videogames
  • Web page
  • Website
  • White House
  • Windows
  • Windows 8
  • Windows Update
  • worm
  • Xbox
  • Xbox 360
  • Xbox One
  • Yahoo
  • Youtube

Blog Archive

  • ▼  2013 (170)
    • ►  September (15)
    • ►  August (13)
    • ▼  July (13)
      • 360 Internet Security 2013 Review
      • 360 Mobile Security Review
      • Bing Child Abuse Pop-Up Warning
      • 1.8 Million Linux Forum Passwords Stolen
      • Browser Comparison 2
      • Google's Motoroloa X Phone To Be Announced August 1st
      • Google Latitude To Be Retired
      • Google Chrome Safe Browsing Extensions
      • Why Linux Servers Are Better Than Windows
      • Apple Trademarking The "iWatch"
      • Website Maintenance
      • Google Reader Is Dead
      • No post image
    • ►  June (16)
    • ►  May (29)
    • ►  April (28)
    • ►  March (30)
    • ►  February (22)
    • ►  January (4)
Powered by Blogger.

About Me

Unknown
View my complete profile