HttpWatch Supports Firefox 3.6 Beta 1

calendarNovember 6, 2009 in Firefox , HttpWatch

Mozilla FirefoxHttpWatch version 6.2.15 now supports Firefox 3.6 Beta 1 as well as public releases of Firefox 2.0, 3.0 and 3.5 .

You can read more about Firefox 3.6 Beta 1 in the Mozilla release notes and a full list of changes to HttpWatch is available on the Version History page and RSS Feed.

HttpWatch Version 6.2 Supports Data Exchange with Firebug

calendarOctober 19, 2009 in Firefox , HttpWatch

We’ve been working with Jan Odvarko, from the Firebug team to create an open file format for sharing HTTP log files. It uses text based, JSON encoding and has been designed for ease of use over performance or comprehensiveness. Most popular programming languages have libraries that can handle the parsing or creation of JSON files so it should be relatively easy to extract data from or create HTTP ARchive (HAR) files.

We released HttpWatch version 6.2 today and one of its major new features is import:

Import of HAR file into HttpWatch Studio

and export of HAR files:

Export to HAR from HttpWatch

There’s no automation support and you can’t save a HAR file as a native HttpWatch log file in this version, but that will be added in a future update to HttpWatch.

To export files from the Net Panel Firebug you’ll need:

There’s also a HAR viewer that renders the file in your browser. At the moment, only Firebug and HttpWatch officially support this file format but other tools vendors are expected to add support in the near future.

The current version of the HAR file format is not as comprehensive as the native HttpWatch file format, so it is still worth saving your log files initially in the .hwl file format. You can then create HAR files if required in HttpWatch Studio.

HttpWatch version 6.2 also contains these new features:

  • A reload dialog is displayed in HttpWatch Studio if a log file has been externally modified
  • The Firefox plug-in now has the same cookie related functionality as the IE plug-in
  • ‘Open’ and ‘Open in New Tab’ commands have been added to the URL column’s context menu

A detailed list of changes and fixes in this release is available on the version history page .

Even more problems with the IE 8 mixed content warning

calendarSeptember 17, 2009 in HTTPS , HttpWatch , Internet Explorer

We have previously written about the pointless and confusing ‘Do you want to view only the webpage content that was delivered securely‘ message in IE 8. It is displayed by default when a secure web page attempts to use non-secure content such as images, javascript or CSS. That post has been so popular that it attracts 40% of the traffic to this blog.

The IE 8 mixed content dialog is pointless because 99.9% of web users just want it to go away and let them get on with what they were doing. For the 0.1% of web surfers who do care, it is confusing because of the way it is worded:

IE 8 Security Warning

The blog post described how you can disable this warning and from the comments it looks like many users are now doing this.

Even if you do this, IE still silently performs the check and hides the re-assuring padlock icon that you normally see on HTTPS pages:

No Padlock icon when mixed content present

This could be disturbing for anyone on a checkout page who is about to enter their credit card details. So if you’re web site developer you really need to avoid using mixed content – even for users who have disabled this warning. Firefox has the mixed content warning turned off by default. Let’s hope Microsoft do the same turn in the next version of IE.

You can normally fix the mixed content warning by ensuring that all the content on a secure page is served up with HTTPS. In HttpWatch you can quickly check a page by using a forced refresh to look for URLs starting with ‘http;’ :

Mixed Content in HttpWatch

However, a customer contacted us recently because they were still getting the mixed content warning even though they had no HTTP URLs on their secure page. After some investigation it was found that this commonly used javascript technique was causing the problem:

// Causes mixed content message in IE on a secure page
document.write("<script id="__ie_onload" src="javascript:void(0)"></script>");
document.getElementById("__ie_onload").onreadystatechange = function()
{
     if (this.readyState == "complete") domReady();
};

It’s a trick used to emulate a DOMContentLoaded event in IE.  A security warning occurs because of the use the “javascript:” protocol even though no download occurs.

The fix is to use //: in the src attribute in the same way as popular javascript libraries such as jQuery and prototype. This does cause a harmless ERROR_INVALID_URL entry in HttpWatch, but it avoids the mixed content message:

// Does not cause a mixed content message in IE on a secure page
document.write("<script id="__ie_onload" src="//:"></script>");
document.getElementById("__ie_onload").onreadystatechange = function()
{
     if (this.readyState == "complete") domReady();
};

Ready to get started? TRY FOR FREE Buy Now