Current version of Firefox renders PDFs natively. And it's possible, IMHO, to make it more secure than IE, though it's tougher to manage in a larger setting.
Kurt On Fri, Oct 4, 2013 at 8:08 AM, James Rankin <[email protected]> wrote: > That doesn't surprise me in the slightest. And why is Adobe Reader so > massive? I may be naive but to me all those extra features just mean extra > vulnerabilities. Even with the Customization Wizard the installs are 100MB+ > - and don't get me started on Pro. Pushing 3GB App-V packages across the > network for that, glorious. > > FoxIt has too many features as well, IMO, and it's tiny compared to > Adobe's guff. I'm using Google Docs from now on for PDFs and on the odd > occasion I need to edit it I will use FoxIt Portable. > > Cheers, > > > > JR > > > On 4 October 2013 15:59, Kennedy, Jim <[email protected]>wrote: > >> /rant back on.**** >> >> ** ** >> >> Dreamweaver requires local admin rights**** >> >> ** ** >> >> /rant off**** >> >> ** ** >> >> *From:* [email protected] [mailto: >> [email protected]] *On Behalf Of *James Rankin >> *Sent:* Friday, October 4, 2013 10:59 AM >> >> *To:* [email protected] >> *Subject:* Re: [NTSysADM] RE: Adobe Customer Data breached**** >> >> ** ** >> >> Adobe should be ditched en masse. They've been a massive target for >> hackers for years along with Java, and they still can't act responsibly. At >> least Microsoft took the beatings of Sasser, Blaster, etc. and came back >> with a proper security mindset. To top it off their code is still the most >> bloated piece of garbage I have to deal with when it comes to delivering >> apps. I hope this puts them out of business.**** >> >> ** ** >> >> Rant off ;-)**** >> >> ** ** >> >> On 4 October 2013 15:52, Kennedy, Jim <[email protected]> >> wrote:**** >> >> We are mapping out a very quick migration to Foxit.**** >> >> **** >> >> *From:* [email protected] [mailto: >> [email protected]] *On Behalf Of *Ziots, Edward >> *Sent:* Friday, October 4, 2013 10:50 AM**** >> >> >> *To:* [email protected] >> *Subject:* RE: [NTSysADM] RE: Adobe Customer Data breached**** >> >> **** >> >> The worst part about it was that some of there source code was stolen >> also, which allows those whom stole it into a treasure trove of possible >> unknown vulnerabilities due to flaws in the code which could bring around >> the next wave of attacks on the PDF/Flash aspects, which are used >> everywhere therefore the impact felt around the world might be very high. I >> am assuming we might see some of these new 0 days in specific web >> exploitation kits in the not-so near future. **** >> >> **** >> >> Z**** >> >> **** >> >> Edward E. Ziots, CISSP, CISA, Security +, Network +**** >> >> Security Engineer**** >> >> Lifespan Organization**** >> >> [email protected]**** >> >> Work:401-255-2497**** >> >> **** >> >> **** >> >> This electronic message and any attachments may be privileged and >> confidential and protected from disclosure. If you are reading this >> message, but are not the intended recipient, nor an employee or agent >> responsible for delivering this message to the intended recipient, you are >> hereby notified that you are strictly prohibited from copying, printing, >> forwarding or otherwise disseminating this communication. If you have >> received this communication in error, please immediately notify the sender >> by replying to the message. Then, delete the message from your computer. >> Thank you.**** >> >> *[image: Description: Description: Lifespan]***** >> >> **** >> >> **** >> >> *From:* [email protected] [mailto: >> [email protected]] *On Behalf Of *Stefan Jafs >> *Sent:* Friday, October 04, 2013 10:39 AM >> *To:* [email protected] >> *Subject:* RE: [NTSysADM] RE: Adobe Customer Data breached**** >> >> **** >> >> Yeah, they sent me an re-set password link this morning and a lengthy >> apology e-mail yesterday.**** >> >> **** >> >> __________________________________**** >> >> *Stefan Jafs***** >> >> **** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Ziots, Edward >> *Sent:* Friday, October 4, 2013 10:02 >> *To:* [email protected] >> *Subject:* RE: [NTSysADM] RE: Adobe Customer Data breached**** >> >> **** >> >> Its much more than that. **** >> >> **** >> >> Z**** >> >> **** >> >> Edward E. Ziots, CISSP, CISA, Security +, Network +**** >> >> Security Engineer**** >> >> Lifespan Organization**** >> >> [email protected]**** >> >> Work:401-255-2497**** >> >> **** >> >> **** >> >> This electronic message and any attachments may be privileged and >> confidential and protected from disclosure. If you are reading this >> message, but are not the intended recipient, nor an employee or agent >> responsible for delivering this message to the intended recipient, you are >> hereby notified that you are strictly prohibited from copying, printing, >> forwarding or otherwise disseminating this communication. If you have >> received this communication in error, please immediately notify the sender >> by replying to the message. Then, delete the message from your computer. >> Thank you.**** >> >> *[image: Description: Description: Lifespan]***** >> >> **** >> >> **** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *James Rankin >> *Sent:* Friday, October 04, 2013 9:06 AM >> *To:* [email protected] >> *Subject:* Re: [NTSysADM] RE: Adobe Customer Data breached**** >> >> **** >> >> Or a ColdFusion one**** >> >> **** >> >> On 4 October 2013 14:04, Richard McClary <[email protected]> >> wrote:**** >> >> Can’t help wondering if someone missed a Flash update**** >> >> **** >> >> --**** >> >> richard**** >> >> **** >> >> *From:* [email protected] [mailto: >> [email protected]] *On Behalf Of *Ziots, Edward >> *Sent:* Friday, October 04, 2013 8:00 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] Adobe Customer Data breached**** >> >> **** >> >> >> http://nakedsecurity.sophos.com/2013/10/04/adobe-owns-up-to-getting-pwned-login-and-credit-card-data-probably-stolen-all-passwords-reset/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=93ed7d3d97-naked%252Bsecurity&utm_term=0_31623bb782-93ed7d3d97-454838729 >> **** >> >> **** >> >> Z**** >> >> **** >> >> Edward E. Ziots, CISSP, CISA, Security +, Network +**** >> >> Security Engineer**** >> >> Lifespan Organization**** >> >> [email protected]**** >> >> Work:401-255-2497**** >> >> **** >> >> **** >> >> This electronic message and any attachments may be privileged and >> confidential and protected from disclosure. If you are reading this >> message, but are not the intended recipient, nor an employee or agent >> responsible for delivering this message to the intended recipient, you are >> hereby notified that you are strictly prohibited from copying, printing, >> forwarding or otherwise disseminating this communication. If you have >> received this communication in error, please immediately notify the sender >> by replying to the message. Then, delete the message from your computer. >> Thank you.**** >> >> *[image: Description: Description: Lifespan]***** >> >> **** >> >> **** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Webster >> *Sent:* Friday, October 04, 2013 8:13 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> **** >> >> Very few (of the sites I go to) ever look at the privileged accounts. >> The last assessment I did had over 100 DA accounts and almost as many EA >> and SA accounts. The majority of their service accounts were in all three >> groups!!! Until I ran MBS’ script, they had no idea how many local SQL >> Server and SQL Express installs had been done using the domain’s SQL >> Service account and that account was a member of all three privileged >> groups.**** >> >> **** >> >> **** >> >> Webster**** >> >> **** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Free, Bob >> *Sent:* Thursday, October 03, 2013 11:52 PM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> **** >> >> The first two I get, the third is really hard to comprehend.**** >> >> **** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Webster >> *Sent:* Thursday, October 03, 2013 8:09 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> **** >> >> MBS’ script works like a charm. I have used it when doing assessments >> for AD migrations. I have NEVER seen an IT org that knew every service >> account used, where they were used or how many of those service accounts >> had domain admins privileges.**** >> >> **** >> >> Webster**** >> >> **** >> >> **** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Michael B. Smith >> *Sent:* Thursday, October 03, 2013 11:00 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> **** >> >> >> http://theessentialexchange.com/blogs/michael/archive/2008/02/29/finding-services-using-non-system-accounts-with-powershell.aspx >> **** >> >> **** >> >> **** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Steve Norton >> *Sent:* Thursday, October 3, 2013 8:10 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] Account Utility**** >> >> **** >> >> A long time ago I used a utility that showed me what account services >> were running under on all my servers. My environment is Windows 2003 and >> 2008 R2. Ideally this would be a utility that I can run from a Windows 7 >> workstation against servers. Suggestions appreciated.**** >> >> **** >> ------------------------------ >> >> PG&E is committed to protecting our customers' privacy. >> To learn more, please visit >> http://www.pge.com/about/company/privacy/customer/**** >> ------------------------------ >> >> >> The information contained in this e-mail, and any attachments hereto, is >> from The American Society for the Prevention of Cruelty to Animals® >> (ASPCA®) and is intended only for use by the addressee(s) named herein and >> may contain legally privileged and/or confidential information. If you are >> not the intended recipient of this e-mail, you are hereby notified that any >> dissemination, distribution, copying or use of the contents of this e-mail, >> and any attachments hereto, is strictly prohibited. If you have received >> this e-mail in error, please immediately notify me by reply email and >> permanently delete the original and any copy of this e-mail and any >> printout thereof. **** >> >> >> >> **** >> >> **** >> >> -- >> *James Rankin* >> Technical Consultant (ACA, CCA, MCTS) >> http://appsensebigot.blogspot.co.uk**** >> >> >> >> **** >> >> ** ** >> >> -- >> *James Rankin* >> Technical Consultant (ACA, CCA, MCTS) >> http://appsensebigot.blogspot.co.uk**** >> > > > > -- > *James Rankin* > Technical Consultant (ACA, CCA, MCTS) > http://appsensebigot.blogspot.co.uk >
<<image001.jpg>>

