Popups are ... not most ads, but they are the most expensive ads
(because of the annoyance factor, in part).

But, yes, I have them disabled, and I do avoid Facebook. And, like
you, I cannot assume that my machine hosts no malware.

Thanks,

-- 
Raul


On Wed, Nov 15, 2017 at 12:43 PM, Don Guinn <[email protected]> wrote:
> To start with, disable pop-ups. You can enable pop-ups for specific apps
> that you do want to allow pop-ups. But that stops most ads. Facebook is
> another problem. As to account numbers and passwords, I don't allow any app
> to save them. None are saved on my computer, so a hacker won't find them on
> my computer except when I am specifically logging onto one of my accounts,
> which I only do incognito.
>
> For all I know, there are viruses on my computer. Just because my
> anti-virus software doesn't find them doesn't mean there are none.
>
> Unfortunately there are many services we have to trust, Microsoft, Apple,
> our computer manufacturers, our internet providers, our router
> manufacturer, our banks or other money managers, medical services, and the
> IRS. They are all strive to provide the best security they can, as long as
> it doesn't interfere with their services or bottom line.
>
> On Wed, Nov 15, 2017 at 10:00 AM, Raul Miller <[email protected]> wrote:
>
>> And, for example, web ads have been a vector for malware. This happens
>> so frequently that Google has automated an alert and takedown process.
>>
>> Basically, all you need is:
>>
>> (a) some malware that can propagate through a browser (which is to
>> say: malware),
>> (b) enough money to buy a web ad placement (maybe a few thousand dollars)
>> (c) a corporate entity you are willing to burn in the process
>> (probably $100 or so to file a corporation at a chamber of commerce).
>> It costs a bit more to get people to act on your behalf though so
>> there's that.
>> (d) some motivation
>>
>> If you're a criminal sort and you've managed to gain access to some
>> credit cards or some other illicit funds, the financial side of things
>> is not much of an obstacle.
>>
>> But it's rather difficult to avoid web ads. That said, if you have
>> some good way of avoiding this problem, I'd be interested in hearing
>> about it.
>>
>> Thanks,
>>
>> --
>> Raul
>>
>>
>> On Wed, Nov 15, 2017 at 11:53 AM, Don Guinn <[email protected]> wrote:
>> > Malware doesn't get in by itself. We have done or accessed some site
>> which
>> > put it on. We need to use common sense and be suspicious of any site we
>> > access, particularly those we are unfamiliar with. It's like walking down
>> > the street. We need to always be aware of our surroundings and stay away
>> > from dangerous places.
>> >
>> > On Wed, Nov 15, 2017 at 9:36 AM, Raul Miller <[email protected]>
>> wrote:
>> >
>> >> That's a tough one, since it's all guess work.
>> >>
>> >> (We do not have hardware support for isolating malware vectors.)
>> >>
>> >> Thanks,
>> >>
>> >> --
>> >> Raul
>> >>
>> >> On Wed, Nov 15, 2017 at 9:58 AM, Don Guinn <[email protected]> wrote:
>> >> > Interesting points. On one issue: viruses.
>> >> >
>> >> > We all have some sort of virus checker on our computers. Occasionally
>> the
>> >> > checker finds something and removes it. But many people think that the
>> >> > problem is fixed. It is not! It is important at this point to figure
>> out
>> >> > how the virus got in and prevent it from happening again.
>> >> >
>> >> > A virus checker is like a rubber. We have to practice "safe
>> computing".
>> >> >
>> >> > On Wed, Nov 15, 2017 at 7:09 AM, Raul Miller <[email protected]>
>> >> wrote:
>> >> >
>> >> >> It is widely acknowledged that the internet is a hostile environment.
>> >> >> There's a plethora of news about malware and other problems. And yet
>> >> >> mostly we seem to adopt a "head in the sand" approach for dealing
>> with
>> >> >> these issues. Or, the software developers I have worked with seem
>> >> >> largely unconcerned about such things, perhaps because other people's
>> >> >> protective work has shielded them [so far] from the failure modes?
>> >> >>
>> >> >> Still, an ounce of prevention is worth a pound of cure. So, here are
>> >> >> some thoughts on how to engineer for resilience:
>> >> >>
>> >> >> (1) Double entry bookkeeping.
>> >> >> https://en.wikipedia.org/wiki/Double-entry_bookkeeping_system
>> >> >>
>> >> >> Any critical information should be stored in multiple ways, designed
>> >> >> so that corruption can be detected and isolated. The trick here is
>> >> >> that you want to isolate and pursue problems which do not make sense.
>> >> >> (If you are hiring for a position for a designer or implementer or
>> >> >> supporter of this kind of thing, people who are fans of Agatha
>> >> >> Christie novels might be good fits - for example.)
>> >> >>
>> >> >> (2) People skills.
>> >> >>
>> >> >> We [as programmers] are accustomed to solving technical problems, but
>> >> >> the problems worth solving are people problems. And on the internet
>> we
>> >> >> have the joy and privilege of facing international conflicts,
>> >> >> political conflicts, economic failures, war zone issues, and a
>> >> >> multitude of other forms of insanity. All at an arms length, but all
>> >> >> of these things are out there, lurking.
>> >> >>
>> >> >> As a result, there's pressures to oversimplify (who wants to deal
>> with
>> >> >> all that?) and while some of that simplification is necessary,
>> >> >> simplifying away from relevant priorities can eat your lunch money
>> for
>> >> >> you.
>> >> >>
>> >> >> Plus, we all make mistakes. And, our handlings for our own personal
>> >> >> mistakes can often serve to help ameliorate external failure modes.
>> >> >>
>> >> >> So there's a real need to be actively coping with failure modes while
>> >> >> building meaningfully useful things for other people who are also
>> >> >> coping. And, people skills seem crucial, here.
>> >> >>
>> >> >> (3) Gathering details on failures.
>> >> >>
>> >> >> Any widely deployed software has to deal with gathering information
>> on
>> >> >> crashes (which, in turn, requires people with some ability to digest
>> >> >> those crash reports). Or, if you can't make sense of someone else's
>> >> >> system, build your own, that gathers information relevant to your
>> >> >> design process.
>> >> >>
>> >> >> But that's all I can think of at the moment.
>> >> >>
>> >> >> The most important part of this, I think, is that you need people who
>> >> >> are level headed about the potential failures. Pretending they don't
>> >> >> happen and/or pretending things are worse than they are tends to get
>> >> >> in the way of reasonable solutions. But you also need a "working
>> >> >> approach" which complements your other priorities.
>> >> >>
>> >> >> As a concrete examples:
>> >> >>
>> >> >> (1) Checksums (including cryptographic hashes) can help catch some
>> >> >> problems (it's worth thinking about what this does and does not
>> >> >> catch).
>> >> >>
>> >> >> (2) Apprenticeship as a design philosophy. If you are working on a
>> >> >> piece of software intended to benefit a professional user, spending
>> >> >> some time working directly for someone who is coping with the
>> problems
>> >> >> you are trying to address can bring the important issues into focus.
>> >> >>
>> >> >> I don't have any recent examples of (3).
>> >> >>
>> >> >> This is motivated by various ongoing failures I've been observing on
>> >> >> some of the machines I work with. The failures themselves do not make
>> >> >> sense, and no one else seems to report having similar problems. I do
>> >> >> not know what to do about such things, except to encourage people to
>> >> >> try to be building for resilience against failures.
>> >> >>
>> >> >> That's all, for now.
>> >> >>
>> >> >> Thanks,
>> >> >>
>> >> >> --
>> >> >> Raul
>> >> >> ------------------------------------------------------------
>> ----------
>> >> >> For information about J forums see http://www.jsoftware.com/
>> forums.htm
>> >> > ------------------------------------------------------------
>> ----------
>> >> > For information about J forums see http://www.jsoftware.com/
>> forums.htm
>> >> ----------------------------------------------------------------------
>> >> For information about J forums see http://www.jsoftware.com/forums.htm
>> >>
>> > ----------------------------------------------------------------------
>> > For information about J forums see http://www.jsoftware.com/forums.htm
>> ----------------------------------------------------------------------
>> For information about J forums see http://www.jsoftware.com/forums.htm
>>
> ----------------------------------------------------------------------
> For information about J forums see http://www.jsoftware.com/forums.htm
----------------------------------------------------------------------
For information about J forums see http://www.jsoftware.com/forums.htm

Reply via email to