Skip to main content

Microsoft ditches Adobe Flash within Metro IE in Windows 8

windows-8-metro
Image used with permission by copyright holder

Announced in an official blog post earlier this week, Microsoft explained why the company wouldn’t be supporting plugins within the Metro version of Internet Explorer 10. Designed to improve security and reliability as well as preserve precious battery life, Microsoft believes leaving out support for plugins like Adobe Flash should ultimately offer the best experience for the consumer. Microsoft claims to have studied nearly 100,000 popular websites and over 60 percent of them already offer HTML5 video for site visitors if the Flash plugin isn’t installed. However, if a user opts to use the desktop version of Windows 8, the Abode Flash plugin is supported.

In addition, Microsoft hasn’t included support for Silverlight within Metro, instead opting to rely on HTML5. For instance, users attempting to use the Netflix streaming video application in the Metro version of Windows 8 won’t be able to access it until Netflix rolls out support for HTML5 video. However, users can flip back over to the desktop version of Windows 8 to install Silverlight and watch Netflix video. If Microsoft decides to create a Metro-only version of the OS for tablets, Flash support would be absent similar to Apple’s approach with the iPad and iPhone. Apple has long been a critic of Adobe Flash and former CEO Steve Jobs constantly stated that Apple should have to wait on a third party developer to improve software for other iPhone and iPad developers to utilize during creation of new apps.

Recommended Videos

Adobe was quick to respond to the news that Windows 8 Metro wouldn’t support Flash. The company mentioned that they are working on a version of Flash that’s compatible with low-power processors found in tablets and smartphones. They also stress that users of Windows 8 will be able to seamlessly switch over to the desktop version of Windows 8 when landing on a site that requires the Flash plugin.

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more