In reply to #9:
Yes, that sums it up. I agree with looking at this closer in Oneiric.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/749335
Title:
Explore options for tab integration with Unity top b
could not*
But this doesn't really help us here. If upstream can't that doesn't
mean Unity shouldn't or couldn't make use of an improved layout.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/749335
T
I was wrong about the default, Firefox 4 final indeed defaults to the menubar.
I could find a rationale for that in this short.
I suppose one reason is the level of Window decoration/WM integration needed.
At any rate Firefox on Linux lacks the no titlebar maximised mode. Not because
the devs pr
Firefox upstream defaults to no menubar in all configurations where
that's possible. Just because OS X forces them and Chrome to use it
doesn't mean we should copy that particular limitation.
The menu button design wins you vertical space:
https://lists.launchpad.net/ayatana/msg05330.html
--
You
Point 3: Natty is the first version shipping Firefox 4 as its default
browser which also is the first Firefox browser to put tabs on top and
got rid of the menubar.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
The difference with Unity is that the space at the top is actually free and
tabs could be put there.
The GNOME top panel always houses the same OS level functionality no matter
what application is active. The Unity panel is dynamic and fills itself with
whatever menu functions the active applica
** Tags added: ui
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/749335
Title:
unity breaks fullscreen tab on top (Fitts's law)
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://list
Public bug reported:
Binary package hint: chromium-browser
Firefox and Chromium/Google Chrome when maximised align tabs right at
the upper screen edge which speeds up accessing these tabs (see Fitts's
Law, the time needed for accessing interface elements depends on their
size, screen edges have i
** Description changed:
Binary package hint: firefox
Blacklist fraudulent UTN-USERFirst-Hardware certificates
http://blog.mozilla.com/security/2011/03/22/firefox-blocking-fraudulent-certificates/
https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-b
As I understand it the debian ca-certificates is shipped more or less
unmodified so no
also Bug #103074
** Also affects: kdelibs (Ubuntu)
Importance: Undecided
Status: New
** Description changed:
Binary package hint: firefox
Blacklist fraudulent UTN-USERFirst-Hardware certific
To determine the severity and urgency of the bug I'd like to know if one
needs a special programmable usb device for this bug or can benign usb
storage and similar devices be modified as well to trigger the bug?
** Tags added: maverick
--
You received this bug notification because you are a memb
*** This bug is a security vulnerability ***
Public security bug reported:
Multiple buffer overflows in the caiaq Native Instruments USB audio
functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might
allow attackers to cause a denial of service or possibly have
unspecified other im
** Description changed:
Binary package hint: firefox
Blacklist fraudulent UTN-USERFirst-Hardware certificates
http://blog.mozilla.com/security/2011/03/22/firefox-blocking-fraudulent-certificates/
https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-b
** Also affects: nss (Ubuntu)
Importance: Undecided
Status: New
** Description changed:
Binary package hint: firefox
Blacklist fraudulent UTN-USERFirst-Hardware certificates
http://blog.mozilla.com/security/2011/03/22/firefox-blocking-fraudulent-certificates/
https://blo
https://blog.torproject.org/blog/detecting-certificate-authority-
compromises-and-web-browser-collusion
The recent incident with the UTN-USERFirst-Hardware certificates as reported in
Bug #741729 shows again how important it is that this is getting addressed.
Comodo got to know about the problem
** Also affects: ca-certificates (Ubuntu)
Importance: Undecided
Status: New
** Also affects: ca-certificates (Debian)
Importance: Undecided
Status: New
** Description changed:
Binary package hint: firefox
+
+ Blacklist fraudulent UTN-USERFirst-Hardware certificates
h
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: firefox
http://blog.mozilla.com/security/2011/03/22/firefox-blocking-fraudulent-certificates/
https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion
Fix
17 matches
Mail list logo