From Wiki96
Jump to: navigation, search
m (Reverted edits by 94.233.241.205 (talk) to last revision by Themirrazz)
Tags: Replaced Rollback
 
Line 1: Line 1:
A Dynamic Wallpaper is a special JSON-based wallpaper format for moving wallpapers. A dynamic wallpaper file (DWP) is a JSON object with the properties `name`, `author`, `url`, and `properties` properties (sounds weird to say "properties properties"). Dynamic Wallpapers were introduced with the release of [[Windows 96 v2]] Service Pack 1.
A Dynamic Wallpaper is a special JSON-based wallpaper format for moving wallpapers. A dynamic wallpaper file (DWP) is a JSON object with the properties `name`, `author`, `url`, and `properties` properties (sounds weird to say "properties properties"). Dynamic Wallpapers were introduced with the release of [[Windows 96 v2]] Service Pack 1.


This is the contents of the DWP file for the Cloud Animated wallpaper.
''This is the contents of the DWP file for the Cloud Animated wallpaper:''
<syntaxhighlight lang="json">
<syntaxhighlight lang="json">
{
{
Line 10: Line 10:
}
}
</syntaxhighlight>
</syntaxhighlight>
== Documentation ==
== Documentation ==


Line 24: Line 22:
== Known Glitches ==
== Known Glitches ==


Dynamic Wallpaper also uses iFrames to display content (just like Internet Exploder).
Dynamic Wallpaper also uses iFrames to display content (just like [[InternetE]]).


Most browsers allow javascript: URLs to run inside an iFrame. When javascript: URLs are run in an iFrame, they are treated as same-origin (just like about:blank). This means users can get infected with malware from applying DWPs or even just previewing them. The JavaScript code could also show an actual wallpaper while secretly corrupting files, adding boot scripts, replacing the shell, adding a custom kernel, and running other malicious processes.
Most browsers allow javascript: URLs to run inside an iFrame. When javascript: URLs are run in an iFrame, they are treated as same-origin (just like about:blank). This means users can get infected with malware from applying DWPs or even just previewing them. The JavaScript code could also show an actual wallpaper while secretly corrupting files, adding boot scripts, replacing the shell, adding a custom kernel, and running other malicious processes.

Latest revision as of 21:00, 11 July 2023

A Dynamic Wallpaper is a special JSON-based wallpaper format for moving wallpapers. A dynamic wallpaper file (DWP) is a JSON object with the properties `name`, `author`, `url`, and `properties` properties (sounds weird to say "properties properties"). Dynamic Wallpapers were introduced with the release of Windows 96 v2 Service Pack 1.

This is the contents of the DWP file for the Cloud Animated wallpaper:

{
	"name": "Cloudy Animated",
	"author": "litevx",
	"url": "/system/resource/dwp/clouds/index.html",
	"properties": {}
}

Documentation

name: The name of the animated wallpaper

author: The name of the person who created the wallpaper

url: The web page the wallpaper is located at

properties: An empty object, unknown what it is for.

Known Glitches

Dynamic Wallpaper also uses iFrames to display content (just like InternetE).

Most browsers allow javascript: URLs to run inside an iFrame. When javascript: URLs are run in an iFrame, they are treated as same-origin (just like about:blank). This means users can get infected with malware from applying DWPs or even just previewing them. The JavaScript code could also show an actual wallpaper while secretly corrupting files, adding boot scripts, replacing the shell, adding a custom kernel, and running other malicious processes.