1 diff -ur mozilla.orig/browser/app/profile/firefox.js mozilla/browser/app/profile/firefox.js
2 --- mozilla.orig/browser/app/profile/firefox.js 2008-06-21 12:55:30.000000000 +0200
3 +++ mozilla/browser/app/profile/firefox.js 2008-06-21 15:25:48.000000000 +0200
5 // App-specific update preferences
7 // Whether or not app updates are enabled
8 -pref("app.update.enabled", true);
9 +pref("app.update.enabled", false);
11 // This preference turns on app.update.mode and allows automatic download and
12 // install to take place. We use a separate boolean toggle for this to make
13 // the UI easier to construct.
14 -pref("app.update.auto", true);
15 +pref("app.update.auto", false);
17 // Defines how the Application Update Service notifies the user about updates:
21 // Whether or not the application should check at startup each time if it
22 // is the default browser.
23 -pref("browser.shell.checkDefaultBrowser", true);
24 +pref("browser.shell.checkDefaultBrowser", false);
26 // 0 = blank, 1 = home (browser.startup.homepage), 2 = last visited page, 3 = resume previous browser session
27 // The behavior of option 3 is detailed at: http://wiki.mozilla.org/Session_Restore
29 pref("network.cookie.cookieBehavior", 0); // 0-Accept, 1-dontAcceptForeign, 2-dontUse
32 +pref("intl.locale.matchOS", true);
33 pref("intl.accept_languages", "chrome://global/locale/intl.properties");
34 pref("intl.charsetmenu.browser.static", "chrome://global/locale/intl.properties");
35 pref("intl.charsetmenu.browser.more1", "chrome://global/locale/intl.properties");
37 pref("alerts.totalOpenTime", 4000);
39 pref("browser.xul.error_pages.enabled", true);
40 -pref("browser.xul.error_pages.expert_bad_cert", false);
41 +pref("browser.xul.error_pages.expert_bad_cert", true);
43 // We want to make sure mail URLs are handled externally...
44 pref("network.protocol-handler.external.mailto", true); // for mail
47 #ifdef MOZ_SAFE_BROWSING
48 // Safe browsing does nothing unless this pref is set
49 -pref("browser.safebrowsing.enabled", true);
50 +pref("browser.safebrowsing.enabled", false);
52 // Prevent loading of pages identified as malware
53 -pref("browser.safebrowsing.malware.enabled", true);
54 +pref("browser.safebrowsing.malware.enabled", false);
56 // Non-enhanced mode (local url lists) URL list to check for updates
57 pref("browser.safebrowsing.provider.0.updateURL", "http://safebrowsing.clients.google.com/safebrowsing/downloads?client={moz:client}&appver={moz:version}&pver=2.1");
58 diff -ur mozilla.orig/browser/locales/en-US/chrome/overrides/netError.dtd mozilla/browser/locales/en-US/chrome/overrides/netError.dtd
59 --- mozilla.orig/browser/locales/en-US/chrome/overrides/netError.dtd 2008-06-21 12:55:30.000000000 +0200
60 +++ mozilla/browser/locales/en-US/chrome/overrides/netError.dtd 2008-06-22 13:52:26.000000000 +0200
62 <!ENTITY securityOverride.warningText "
63 <p>You should not add an exception if you are using an internet connection that you do not trust completely or if you are not used to seeing a warning for this server.</p>
65 -<xul:button xmlns:xul='http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul' id='getMeOutOfHereButton' label='&securityOverride.getMeOutOfHereButton;'/>
66 <xul:button xmlns:xul='http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul' id='exceptionDialogButton' label='&securityOverride.exceptionButtonLabel;'/>
67 +<xul:button xmlns:xul='http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul' id='getMeOutOfHereButton' label='&securityOverride.getMeOutOfHereButton;'/>