Adobe today shipped the first public preview of Edge Reflow. First shown off last September , the new application for responsive Web design is designed to make it easier for developers to produce webpages that alter their layout in response to changes in screen size, enabling the same page to be used on both desktop and portable devices. The company is also shipping an update for three other tools. It’s adding direct support for using the free Edge Web Fonts to its Web development app Dreamweaver and its timeline-based animation software Edge Animate. Edge Animate is also picking up new support for CSS gradients. Finally, the Edge Code HTML editor, currently available as a preview, is being updated to support live previewing and a quick edit mode that allows scripts and styles to be edited where they’re used even when they’re stored in separate files. The new Edge Reflow app looks handy for those interested in responsive Web design, and the other improvements are pleasant if incremental. The most significant thing is not the updates themselves, however, but the fact that they’re being made exclusive to Creative Cloud subscribers. Buyers of the traditional perpetually licensed versions of Creative Suite are excluded. Read 3 remaining paragraphs | Comments
Excerpt from:
Adobe ships new features, new apps, exclusively to cloud subscribers
Aurich Lawson Early on Halloween morning, members of Facebook’s Computer Emergency Response Team received an urgent e-mail from an FBI special agent who regularly briefs them on security matters. The e-mail contained a Facebook link to a PHP script that appeared to give anyone who knew its location unfettered access to the site’s front-end system. It also referenced a suspicious IP address that suggested criminal hackers in Beijing were involved. “Sorry for the early e-mail but I am at the airport about to fly home,” the e-mail started. It was 7:01am. “Based on what I know of the group it could be ugly. Not sure if you can see it anywhere or if it’s even yours.” The e-mail reporting a simulated hack into Facebook’s network. It touched off a major drill designed to test the company’s ability to respond to security crises. Facebook Facebook employees immediately dug into the mysterious code. What they found only heightened suspicions that something was terribly wrong. Facebook procedures require all code posted to the site to be handled by two members of its development team, and yet this script somehow evaded those measures. At 10:45am, the incident received a classification known as “unbreak now,” the Facebook equivalent of the US military’s emergency DEFCON 1 rating. At 11:04am, after identifying the account used to publish the code, the team learned the engineer the account belonged to knew nothing about the script. One minute later, they issued a takedown to remove the code from their servers. Read 31 remaining paragraphs | Comments