{"id":311,"date":"2008-08-30T21:58:01","date_gmt":"2008-08-30T13:58:01","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/08\/30\/ie-8\/"},"modified":"2008-08-30T21:58:01","modified_gmt":"2008-08-30T13:58:01","slug":"ie-8","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=311","title":{"rendered":"\u5fae\u8edfIE 8\u4e2d\u6587\u7248\u7b2c\u56db\u5b63\u63a8\u51fa\u3000\u5efa\u5fb9\u5e95\u522a\u9664\u700f\u89bd\u7d00\u9304\u529f\u80fd"},"content":{"rendered":"<p>\u4ee5\u4e0b\u6587\u7ae0\u4f86\u81ea\uff1a<a href=\"http:\/\/www.searchsmbhk.com\/article.php?type=article&#038;id_article=1115\" target=\"_blank\" title=\"SearchSMBHK\" rel=\"noopener\">SearchSMBHK<\/a><\/p>\n<p>29 Aug 2008<\/p>\n<p>\u5fae\u8edf\u9810\u5b9a\u7b2c\u56db\u5b63\u63a8\u51fa\u529f\u80fd\u66f4\u5f37\u5927\u3001\u4e14\u5b89\u5168\u6027\u66f4\u9ad8\u7684\u4e0b\u4e00\u4ee3\u700f\u89bd\u5668 Internet Explorer 8\u3002\u65b0\u7248\u7684\u700f\u89bd\u5668\u5f37\u8abf\u80fd\u7d50\u5408\u7b2c\u4e09\u65b9\u7db2\u7ad9\uff0c\u70ba\u4f7f\u7528\u8005\u63d0\u4f9b\u66f4\u597d\u7684\u7528\u5bb6\u7d93\u9a57\uff0c\u4e26\u52a0\u5165\u5b89\u5168\u529f\u80fd\uff0c\u78ba\u4fdd\u4f7f\u7528\u8005\u8cc7\u8a0a\u4e0d\u5916\u6d29\u3002<\/p>\n<p>\u64da\u6089\uff0cIE8\u700f\u89bd\u5668\u5167\u6703\u88dd\u6709\u4e00\u6b3e\u540d\u70ba\u300cInPrivate\u300d\u7684\u65b0\u8edf\u4ef6\uff0c\u4e0a\u7db2\u4eba\u58eb\u53ea\u9700\u4f5c\u51fa\u4e00\u4e9b\u7c21\u55ae\u7684\u8a2d\u5b9a\uff0c\u518d\u6309\u4e00\u6309\u63a3\uff0c\u7576\u5176\u4ed6\u4eba\u4f7f\u7528\u540c\u4e00\u90e8\u96fb\u8166\u6642\uff0c\u4e0d\u6703\u77e5\u9053\u4e0a\u624b\u7528\u5bb6\u66fe\u7d93\u767b\u5165\u6216\u89c0\u770b\u904e\u54ea\u4e9b\u7db2\u7ad9\u3002\u96d6\u7136\u76ee\u524d\u5176\u4ed6\u700f\u89bd\u5668\u4ee5\u53ca\u820a\u7248\u672c\u7684\u300cIE\u300d\uff0c\u90fd\u5177\u5099\u522a\u9664\u4e0a\u7db2\u700f\u89bd\u7d00\u9304\u7684\u529f\u80fd\uff0c\u4f46\u4e8b\u5be6\u4e0a\u4e26\u4e0d\u5fb9\u5e95\uff0c\u4f8b\u5982\u57f7\u6cd5\u4eba\u54e1\u5728\u5fc5\u8981\u6642\uff0c\u9084\u662f\u6709\u65b9\u6cd5\u8ffd\u67e5\u5230\u8cc7\u6599\u7d00\u9304\u3002\u4f46\u300cIE8\u300d\u7684\u300cInPrivate\u300d\u5728\u522a\u9664\u700f\u89bd\u7d00\u9304\u65b9\u9762\uff0c\u5247\u53ef\u8b93\u4f7f\u7528\u8005\u5728\u700f\u89bd\u6642\u66ab\u505c\u5132\u5b58\u529f\u80fd\uff0c\u4ee4\u700f\u89bd\u6b77\u7a0b\u4e0d\u88ab\u8a18\u9304\u4e0b\u4f86\uff0c\u9019\u660e\u986f\u6709\u52a9\u65bc\u516c\u5171\u96fb\u8166\u7684\u4f7f\u7528\u8005\u96b1\u79c1\u4e0d\u8b93\u4ed6\u4eba\u5f97\u77e5\uff0c\u52a0\u5f37\u4fdd\u8b77\u4e0a\u7db2\u4eba\u58eb\u7684\u79c1\u96b1\u3002<\/p>\n<p>\u5728\u500b\u4eba\u7528\u6236\u5c64\u9762\u800c\u8a00\uff0c\u9019\u7a2e\u5f37\u5316\u7684\u4fdd\u8b77\u529f\u80fd\uff0c\u6703\u4ee4Google\u7b49\u7db2\u4e0a\u5ee3\u544a\u516c\u53f8\uff0c\u7121\u6cd5\u63a2\u6e2c\u7db2\u6c11\u7684\u4e0a\u7db2\u884c\u70ba\u548c\u7fd2\u6163\uff0c\u5236\u8a02\u7b56\u7565\u64f4\u5c55\u7db2\u4e0a\u5ee3\u544a\u5ba3\u50b3\u696d\u52d9\u3002\u7136\u800c\uff0c\u5728\u4f01\u696d\u7684\u7acb\u5834\u4f86\u8b1b\uff0c\u9019\u7a2e\u529f\u80fd\u662f\u9700\u8981\u63a7\u5236\u7684\u3002\u5fae\u8edf\u8868\u793a\uff0cIT\u7ba1\u7406\u54e1\u6709\u80fd\u529b\u901a\u904e\u7d44\u7b56\u7565\u7ba1\u7406\u9019\u4e9b\u8a2d\u7f6e\uff0c\u95dc\u9589\u548c\u555f\u7528\u5728\u4ed6\u5011\u74b0\u5883\u4e2d\u7684\u96b1\u79c1\u529f\u80fd\uff0c\u65b9\u4fbf\u638c\u63e1\u54e1\u5de5\u4e0a\u7db2\u7684\u60c5\u6cc1\u3002<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4ee5\u4e0b\u6587\u7ae0\u4f86\u81ea\uff1aSearchSMBHK 29 Aug 2008 \u5fae\u8edf\u9810\u5b9a\u7b2c\u56db\u5b63\u63a8\u51fa\u529f\u80fd\u66f4\u5f37\u5927\u3001\u4e14\u5b89\u5168\u6027\u66f4\u9ad8\u7684\u4e0b\u4e00 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-311","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=311"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/311\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}