Screen IE browser (ie do not show)
Copy Code code as follows:
*:lang (en) Select {font:12px!important}/*ff visible, special statement: Due to Opera's latest update, this sentence has now become a special FF hack*/
Select:empty {font:12px!important}/*safari Visible * *
Here the Select is a selector and is replaced according to the situation. The second sentence is unique to the Safari browser on the Mac.
Only IE7 recognition
What is the principle of CSS hack
Because of the different browsers to the CSS support and resolution results, but also due to the priority of the CSS in the relationship. We can write different CSS for different browsers according to this.
There are roughly 3 forms of CSS Hack, CSS class internal Hack, selector Hack
CSS hack: different browsers have different CSS resolutions, which may lead to different page effects. At this time, we need to write different CSS for different browsers so that they can be compatible with different browsers at the same time, so that we can get the desired page effect in different browsers.
CSS Hack has three forms: CSS class internal Hack, sel
This article mainly describes the use of John the Ripper tool to try to crack the Linux password method, this tool may be used primarily to crack the system user's password to obtain file operation permissions, the need for friends can refer to the followingJohn is different from tools like Hdra. Hydra a blind brute force attack by attempting a username/password combination on the FTP server or the service daemon on the Telnet server. However, John needs to hash first. So, the bigger challenge f
Hack static type, with some advanced features (in comparison) such as anonymous functions. There are also asynchronous and so on. What we cannot bear is whether the variable name must be added with $. Gt; Facebook is a family that is keen on using PHP, but BryanO Sullivan, head of the Hack team, also pointed out that since many developers are developing many different projects, it makes sense to be able to
Introduction of this for different browsers to write different CSS code process, called CSS hack!2 principle because different browsers support and parsing of CSS, but also due to the precedence of CSS in the relationship. We can write different CSS for different browsers according to this. There are roughly 3 forms of CSS Hack, CSS class internal Hack, selector
Now the browser Ie6-ie10, Firefox, Chrome, Opera, Safari ... A large number of schools of contention, the user has a lot of choice, but this can be painful to the Web front-end developers.Today, some commonly used CSS hack, including the commonly used IE hack and Firefox, Chrome, Opera browser hack, and the CSS hack to
IE7 and Firefox will consider it to be higher priority, ignoring the "background-color:blue;" and for IE6, so!important is not recognized, so jump directly over the line code, which is shown in blue.IE8 IE9 Hack\9 only IE6789 support, often used to differentiate IE and FirefoxOnly IE8 IE9 support\9\0 only IE9 supportsuch as the following code, in Firefox, Google display red, IE8 display blue, IE9 display Color:fuchsia color, IE7 display Color:aqua co
* Both IE6 and IE7 can be identified_ Only IE6 can identifyOnly IE8 can identify: Root only IE9 can identifyIt's a cliché that CSS is compatible with every browser, and the tutorials are all over the Web. The following content is not too many novel, purely personal summary, hoping to have some help for beginners.First, CSS HACKHack concept:Different browsers, such as Internet Explorer 6,internet Explorer 7,mozilla Firefox and so on, the parsing of CSS is not the same, it will result in the resul
VBulletin HACK
----Display the topic size and open a new window on the Forum index page
Author: gogosoft
"Show topic Size"
Cause: 1.1.4 does not have this feature, and some users will use this as a reference to whether to view the topic.
Advantages: Just add a few lines of code to it.
Disadvantage: Because every time you display the Forum index page, you need to calculate the total size of the topic on the page, so you may have some impact on the ser
Article Introduction: as we all know, sometimes in order to achieve some of the effects of IE in line with modern browsers, we have to use some hack means to achieve the goal. For example, the use of "", "\" and "\9" to allow only some version of IE to identify, and for modern browsers, he will directly ignore the code. Today I want to introduce you to the use of @media to achieve IE hack method.
CSS hack because of different manufacturers of browsers, such as the Internet Explorer,safari,mozilla Firefox,chrome, or different versions of the same manufacturer's browser, such as IE6 and IE7, the parsing of CSS is not exactly the same, As a result, the resulting page effect is not the same as the page effect we need. At this time we need to write different CSS for different browsers, so that it can be compatible with different browsers, can be in
CSS Hack and backward compatibility Frequently Asked Questions
Once people get used to something, it is difficult to modify it. There are various reasons why new browsers are becoming increasingly popular and old browsers cannot be eliminated. Increasing Speed is always faster than dying, leading to browser compatibility. Speaking of browser compatibility, css hack is naturally remembered. Today, we usuall
Core tips: CSS tips: About CSS hack and float closure
First, CSS HACK
The following two methods can solve almost all hack today.
1,!importantWith the support of IE7 to!important, the!important method is now targeted only at IE6 hack. (Note the wording. Remember that the claim position needs to be advanced.)
2, Ie
1.IE Conditional Annotation Method:
CSS file test.css only loaded into IE browser, for non-IE browser will ignore this point
Load CSS files for a specific version of the browser
For a range of the version of IE for hack, you can combine LTE (less than equal), lt (less than), GTE (greater than equals), GT (greater than), (not equal to), and so on keywords to comment
Example: only valid for versions above IE6
Not effective only on IE7
A condition
ajax|xml| data
AJAX hacks hack 4. Receive data in XML format Many of the current data interchange technologies use XML-formatted data because XML-formatted data is widely used and supported. Therefore, different users can have the technology to generate, send, receive XML data without the need to use other tools to transform the format of the data.A typical example is a GPS device that can share the data it needs anywhere. Whether on a long journey or
What is CSS hackCSS hack because of different browsers, such as Ie6,ie7,firefox, and so on, the parsing of CSS is not the same, so the resulting page effect is not the same, get the page effect we need. At this time we need to write different CSS for different browsers, so that it can be compatible with different browsers, can be in different browsers can also get the desired page effect.CSS Hack Categories
Hack
static types, with some advanced features (in contrast) such as anonymous functions. There are also asynchronous and the like, can not tolerate the variable name or to add $.
> Facebook is a big family that loves PHP, but Hack team leader Blaine Oshaliven (Bryan O ' Sullivan) also points out that, given that many developers are developing many different projects, it will make sense to catch errors b
CollectHackWriting Method
The following is my collection of hack statements for various browsers:
1. Firefox
The new identification code added by the black body to adapt to the browser
@-Moz-document URL-prefix (){
. Selector {
Property: value;
}
}Firefox supports the following methods:
# Selector[ID = selector]{// ID Selector
Property: value;
} Or:
@-Moz-document URL-prefix (){
. Selector {
Property: value;
}
}
*>. Selector {
Property: value;
}
2. W
Once you get used to something, it's hard to change it, and for all sorts of reasons, there's more and more new browsers, and the old ones can't be eliminated. Growth is always faster than extinction, which makes browser compatibility a topic of endless conversation. When it comes to browser compatibility, CSS hack is naturally remembered by us. Today, we usually have a team or a team of people in a company to do the same thing, we need to have a unif
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.