Current version of Firefox renders PDFs natively. And it's possible, IMHO,
to make it more secure than IE, though it's tougher to manage in a larger
setting.

Kurt


On Fri, Oct 4, 2013 at 8:08 AM, James Rankin <[email protected]> wrote:

> That doesn't surprise me in the slightest. And why is Adobe Reader so
> massive? I may be naive but to me all those extra features just mean extra
> vulnerabilities. Even with the Customization Wizard the installs are 100MB+
> - and don't get me started on Pro. Pushing 3GB App-V packages across the
> network for that, glorious.
>
> FoxIt has too many features as well, IMO, and it's tiny compared to
> Adobe's guff. I'm using Google Docs from now on for PDFs and on the odd
> occasion I need to edit it I will use FoxIt Portable.
>
> Cheers,
>
>
>
> JR
>
>
> On 4 October 2013 15:59, Kennedy, Jim <[email protected]>wrote:
>
>>  /rant back on.****
>>
>> ** **
>>
>> Dreamweaver requires local admin rights****
>>
>> ** **
>>
>> /rant off****
>>
>> ** **
>>
>> *From:* [email protected] [mailto:
>> [email protected]] *On Behalf Of *James Rankin
>> *Sent:* Friday, October 4, 2013 10:59 AM
>>
>> *To:* [email protected]
>> *Subject:* Re: [NTSysADM] RE: Adobe Customer Data breached****
>>
>> ** **
>>
>> Adobe should be ditched en masse. They've been a massive target for
>> hackers for years along with Java, and they still can't act responsibly. At
>> least Microsoft took the beatings of Sasser, Blaster, etc. and came back
>> with a proper security mindset. To top it off their code is still the most
>> bloated piece of garbage I have to deal with when it comes to delivering
>> apps. I hope this puts them out of business.****
>>
>> ** **
>>
>> Rant off ;-)****
>>
>> ** **
>>
>> On 4 October 2013 15:52, Kennedy, Jim <[email protected]>
>> wrote:****
>>
>> We are mapping out a very quick migration to Foxit.****
>>
>>  ****
>>
>> *From:* [email protected] [mailto:
>> [email protected]] *On Behalf Of *Ziots, Edward
>> *Sent:* Friday, October 4, 2013 10:50 AM****
>>
>>
>> *To:* [email protected]
>> *Subject:* RE: [NTSysADM] RE: Adobe Customer Data breached****
>>
>>  ****
>>
>> The worst part about it was that some of there source code was stolen
>> also, which allows those whom stole it into a treasure trove of possible
>> unknown vulnerabilities due to flaws in the code which could bring around
>> the next wave of attacks on the PDF/Flash aspects, which are used
>> everywhere therefore the impact felt around the world might be very high. I
>> am assuming we might see some of these new 0 days in specific web
>> exploitation kits in the not-so near future. ****
>>
>>  ****
>>
>> Z****
>>
>>  ****
>>
>> Edward E. Ziots, CISSP, CISA, Security +, Network +****
>>
>> Security Engineer****
>>
>> Lifespan Organization****
>>
>> [email protected]****
>>
>> Work:401-255-2497****
>>
>>  ****
>>
>>  ****
>>
>> This electronic message and any attachments may be privileged and
>> confidential and protected from disclosure. If you are reading this
>> message, but are not the intended recipient, nor an employee or agent
>> responsible for delivering this message to the intended recipient, you are
>> hereby notified that you are strictly prohibited from copying, printing,
>> forwarding or otherwise disseminating this communication. If you have
>> received this communication in error, please immediately notify the sender
>> by replying to the message. Then, delete the message from your computer.
>> Thank you.****
>>
>> *[image: Description: Description: Lifespan]*****
>>
>>  ****
>>
>>  ****
>>
>> *From:* [email protected] [mailto:
>> [email protected]] *On Behalf Of *Stefan Jafs
>> *Sent:* Friday, October 04, 2013 10:39 AM
>> *To:* [email protected]
>> *Subject:* RE: [NTSysADM] RE: Adobe Customer Data breached****
>>
>>  ****
>>
>> Yeah, they sent me an re-set password link this morning and a lengthy
>> apology e-mail yesterday.****
>>
>>  ****
>>
>> __________________________________****
>>
>> *Stefan Jafs*****
>>
>>  ****
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Ziots, Edward
>> *Sent:* Friday, October 4, 2013 10:02
>> *To:* [email protected]
>> *Subject:* RE: [NTSysADM] RE: Adobe Customer Data breached****
>>
>>  ****
>>
>> Its much more than that. ****
>>
>>  ****
>>
>> Z****
>>
>>  ****
>>
>> Edward E. Ziots, CISSP, CISA, Security +, Network +****
>>
>> Security Engineer****
>>
>> Lifespan Organization****
>>
>> [email protected]****
>>
>> Work:401-255-2497****
>>
>>  ****
>>
>>  ****
>>
>> This electronic message and any attachments may be privileged and
>> confidential and protected from disclosure. If you are reading this
>> message, but are not the intended recipient, nor an employee or agent
>> responsible for delivering this message to the intended recipient, you are
>> hereby notified that you are strictly prohibited from copying, printing,
>> forwarding or otherwise disseminating this communication. If you have
>> received this communication in error, please immediately notify the sender
>> by replying to the message. Then, delete the message from your computer.
>> Thank you.****
>>
>> *[image: Description: Description: Lifespan]*****
>>
>>  ****
>>
>>  ****
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *James Rankin
>> *Sent:* Friday, October 04, 2013 9:06 AM
>> *To:* [email protected]
>> *Subject:* Re: [NTSysADM] RE: Adobe Customer Data breached****
>>
>>  ****
>>
>> Or a ColdFusion one****
>>
>>  ****
>>
>> On 4 October 2013 14:04, Richard McClary <[email protected]>
>> wrote:****
>>
>> Can’t help wondering if someone missed a Flash update****
>>
>>  ****
>>
>> --****
>>
>> richard****
>>
>>  ****
>>
>> *From:* [email protected] [mailto:
>> [email protected]] *On Behalf Of *Ziots, Edward
>> *Sent:* Friday, October 04, 2013 8:00 AM
>> *To:* [email protected]
>> *Subject:* [NTSysADM] Adobe Customer Data breached****
>>
>>  ****
>>
>>
>> http://nakedsecurity.sophos.com/2013/10/04/adobe-owns-up-to-getting-pwned-login-and-credit-card-data-probably-stolen-all-passwords-reset/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=93ed7d3d97-naked%252Bsecurity&utm_term=0_31623bb782-93ed7d3d97-454838729
>> ****
>>
>>  ****
>>
>> Z****
>>
>>  ****
>>
>> Edward E. Ziots, CISSP, CISA, Security +, Network +****
>>
>> Security Engineer****
>>
>> Lifespan Organization****
>>
>> [email protected]****
>>
>> Work:401-255-2497****
>>
>>  ****
>>
>>  ****
>>
>> This electronic message and any attachments may be privileged and
>> confidential and protected from disclosure. If you are reading this
>> message, but are not the intended recipient, nor an employee or agent
>> responsible for delivering this message to the intended recipient, you are
>> hereby notified that you are strictly prohibited from copying, printing,
>> forwarding or otherwise disseminating this communication. If you have
>> received this communication in error, please immediately notify the sender
>> by replying to the message. Then, delete the message from your computer.
>> Thank you.****
>>
>> *[image: Description: Description: Lifespan]*****
>>
>>  ****
>>
>>  ****
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Webster
>> *Sent:* Friday, October 04, 2013 8:13 AM
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: Account Utility****
>>
>>  ****
>>
>> Very few (of the sites I go to) ever look at the privileged accounts.
>> The last assessment I did had over 100 DA accounts and almost as many EA
>> and SA accounts.  The majority of their service accounts were in all three
>> groups!!!   Until I ran MBS’ script, they had no idea how many local SQL
>> Server and SQL Express installs had been done using the domain’s SQL
>> Service account and that account was a member of all three privileged
>> groups.****
>>
>>  ****
>>
>>  ****
>>
>> Webster****
>>
>>  ****
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Free, Bob
>> *Sent:* Thursday, October 03, 2013 11:52 PM
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: Account Utility****
>>
>>  ****
>>
>> The first two I get, the third is really hard to comprehend.****
>>
>>  ****
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Webster
>> *Sent:* Thursday, October 03, 2013 8:09 AM
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: Account Utility****
>>
>>  ****
>>
>> MBS’ script works like a charm.  I have used it when doing assessments
>> for AD migrations.  I have NEVER seen an IT org that knew every service
>> account used, where they were used or how many of those service accounts
>> had domain admins privileges.****
>>
>>  ****
>>
>> Webster****
>>
>>  ****
>>
>>  ****
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Michael B. Smith
>> *Sent:* Thursday, October 03, 2013 11:00 AM
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: Account Utility****
>>
>>  ****
>>
>>
>> http://theessentialexchange.com/blogs/michael/archive/2008/02/29/finding-services-using-non-system-accounts-with-powershell.aspx
>> ****
>>
>>  ****
>>
>>  ****
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Steve Norton
>> *Sent:* Thursday, October 3, 2013 8:10 AM
>> *To:* [email protected]
>> *Subject:* [NTSysADM] Account Utility****
>>
>>  ****
>>
>> A long time ago I used a utility that showed me what account services
>> were running under on all my servers. My environment is Windows 2003 and
>> 2008 R2. Ideally this would be a utility that I can run from a Windows 7
>> workstation against servers. Suggestions appreciated.****
>>
>>  ****
>>  ------------------------------
>>
>> PG&E is committed to protecting our customers' privacy.
>> To learn more, please visit
>> http://www.pge.com/about/company/privacy/customer/****
>>  ------------------------------
>>
>>
>> The information contained in this e-mail, and any attachments hereto, is
>> from The American Society for the Prevention of Cruelty to Animals®
>> (ASPCA®) and is intended only for use by the addressee(s) named herein and
>> may contain legally privileged and/or confidential information. If you are
>> not the intended recipient of this e-mail, you are hereby notified that any
>> dissemination, distribution, copying or use of the contents of this e-mail,
>> and any attachments hereto, is strictly prohibited. If you have received
>> this e-mail in error, please immediately notify me by reply email and
>> permanently delete the original and any copy of this e-mail and any
>> printout thereof. ****
>>
>>
>>
>> ****
>>
>>  ****
>>
>> --
>> *James Rankin*
>> Technical Consultant (ACA, CCA, MCTS)
>> http://appsensebigot.blogspot.co.uk****
>>
>>
>>
>> ****
>>
>> ** **
>>
>> --
>> *James Rankin*
>> Technical Consultant (ACA, CCA, MCTS)
>> http://appsensebigot.blogspot.co.uk****
>>
>
>
>
> --
> *James Rankin*
> Technical Consultant (ACA, CCA, MCTS)
> http://appsensebigot.blogspot.co.uk
>

<<image001.jpg>>

Reply via email to