{"id":461,"date":"2009-01-30T08:07:28","date_gmt":"2009-01-30T00:07:28","guid":{"rendered":"http:\/\/localhost\/portal\/2009\/01\/30\/ie8\/"},"modified":"2009-01-30T08:07:28","modified_gmt":"2009-01-30T00:07:28","slug":"ie8","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=461","title":{"rendered":"IE8\u5c07\u5f37\u5236\u66f4\u65b0\uff0c\u5fae\u8edf\u63d0\u4f9b\u4f01\u696d\u514d\u66f4\u65b0\u5de5\u5177"},"content":{"rendered":"<p>\n\u6587\/\u738b\u5b8f\u4ec1 (\u8a18\u8005) 2009-01-23<\/p>\n<p>\u5fae\u8edf\u5728IE\u5b98\u65b9\u90e8\u843d\u683c\u4e0a\u5ba3\u5e03\uff0c\u672a\u4f86IE 8.0\u7248\u5c07\u63a1\u53d6\u5f37\u5236\u66f4\u65b0\u7684\u65b9\u5f0f\uff0c\u900f\u904e\u5fae\u8edf\u66f4\u65b0\u7db2\u7ad9\u81ea\u52d5\u66f4\u65b0\u3002<\/p>\n<p>\u5fae\u8edf\u5728IE\u5b98\u65b9\u90e8\u843d\u683c\u4e0a\u5ba3\u5e03\uff0c\u672a\u4f86IE 8.0\u7248\u5c07\u63a1\u53d6\u5f37\u5236\u66f4\u65b0\u7684\u65b9\u5f0f\uff0c\u900f\u904e\u5fae\u8edf\u66f4\u65b0\u7db2\u7ad9\u81ea\u52d5\u66f4\u65b0\uff0c\u5c31\u5982\u540c\u904e\u53bb\u66f4\u65b0IE 7\u7684\u65b9\u5f0f\u4e00\u6a23\u3002<\/p>\n<p>\u5fae\u8edf\u8868\u793a\uff0c\u56e0\u70ba8.0\u7248\u548c7.0\u7248\u4e0d\u76f8\u5bb9\uff0c\u6240\u4ee5\uff0c\u57288.0\u7248\u4e2d\u6703\u63d0\u4f9b\u5411\u4e0b\u76f8\u5bb9\u7684\u6a5f\u5236\uff0c\u4f8b\u5982IE8\u5167\u5efa\u4e86IE 7\u76f8\u5bb9\u6a21\u5f0f\uff0c\u8b93\u4f7f\u7528\u8005\u53ef\u81ea\u884c\u5207\u63db\u3002<\/p>\n<p>\u53e6\u5916\uff0c\u5fae\u8edf\u4e5f\u514d\u8cbb\u91cb\u51fa\u9632\u6b62IE8\u81ea\u52d5\u66f4\u65b0\u7684\u5de5\u5177\uff08IE8 Blocker Toolkit\uff09\uff0c\u63d0\u4f9b\u4f01\u696d\u53ef\u900f\u904e\u7fa4\u7d44\u539f\u5247\uff0c\u4f86\u95dc\u9589\u5167\u90e8\u96fb\u8166\u81ea\u52d5\u5347\u7d1aIE8\u7684\u529f\u80fd\uff0c\u7dad\u6301\u5167\u90e8\u7db2\u7ad9\u7684\u904b\u4f5c\u3002<\/p>\n<p>\u76ee\u524d\uff0cIE 8\u53ea\u767c\u5e03\u5230Beta\u6e2c\u8a66\u7248\uff0c\u5fae\u8edf\u8868\u793a\uff0c\u529f\u80fd\u9084\u6703\u8abf\u6574\uff0c\u5fc5\u9808\u7b49\u5230\u4e0b\u4e00\u500b\u7248\u672c\u624d\u6703\u78ba\u5b9a\u6700\u5f8c\u63a1\u7528\u7684\u529f\u80fd\u3002\u4e0d\u904e\uff0c\u81fa\u7063\u5fae\u8edf\u5df2\u958b\u59cb\u548c\u5927\u578b\u7db2\u7ad9\u696d\u8005\u6d3d\u8ac7\u5408\u4f5c\uff0c\u6e2c\u8a66\u9019\u4e9b\u7db2\u7ad9\u5728IE 8\u4e2d\u57f7\u884c\u7684\u76f8\u5bb9\u60c5\u5f62\u3002\u81fa\u7063\u5fae\u8edf\u524d\u7aef\u5e73\u81fa\u4e8b\u696d\u90e8\u5354\u7406\u8449\u6021\u541b\u8868\u793a\uff0cIE 8\u6b63\u5f0f\u7248\u6700\u5feb\u8981\u7b49\u5230\u4eca\u5e743\u6708\u5f8c\u624d\u6703\u63a8\u51fa\u3002<\/p>\n<p>\u6587\u2299\u738b\u5b8f\u4ec1 <\/p>\n<p>\u4ee5\u4e0a\u6587\u7ae0\u4f86\u81ea\uff1a<a href=\"http:\/\/www.ithome.com.tw\/itadm\/article.php?c=53147\" target=\"_blank\" rel=\"noopener\">iThome<\/a><\/p>\n<p><a href=\"http:\/\/tw.webmaster.yahoo.com\/\"><img decoding=\"async\" border=\"0\" src=\"http:\/\/tw.img.webmaster.yahoo.com\/108667\/ystats.gif\" alt=\"alt\" \/><\/a><br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6587\/\u738b\u5b8f\u4ec1 (\u8a18\u8005) 2009-01-23 \u5fae\u8edf\u5728IE\u5b98\u65b9\u90e8\u843d\u683c\u4e0a\u5ba3\u5e03\uff0c\u672a\u4f86IE 8.0\u7248\u5c07\u63a1\u53d6\u5f37\u5236\u66f4\u65b0\u7684\u65b9\u5f0f [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-461","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=461"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/461\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}