The thing is, at least on the spyware front, that most spyware requires
you to be browsing in IE to become infected. Most Mac people don't use
IE5 for Mac anymore, since it's so old and a piece of crap compared to
Safari.
Without ActiveX, it's a lot harder to get spyware on your machine.
Spyware requires IE because that is the browser most novices use who don't
know how to easily avoid spyware. Firefox does support native plugins so
don't see how you can say that Firefox is really any different from IE.
Eli
- Original Message -
The thing is, at least on the spyware
At 09:00 AM 16/06/2005, Eli Allen wrote:
Spyware requires IE because that is the browser most novices use who don't
know how to easily avoid spyware. Firefox does support native plugins so
don't see how you can say that Firefox is really any different from IE.
Except that it doesn't support
Lack of support for ActiveX.
Eli Allen wrote:
Spyware requires IE because that is the browser most novices use who
don't know how to easily avoid spyware. Firefox does support native
plugins so don't see how you can say that Firefox is really any
different from IE.
Just because it doesn't support ActiveX doesn't mean anything. As I said,
spyware requires IE because that is the browser most novices use who don't
know how to easily avoid spyware. There is nothing inherent about ActiveX
other then it being the popular way of doing things so if another
Native code is native code. Nothing inherent about ActiveX.
- Original Message -
Lack of support for ActiveX.
Eli Allen wrote:
Spyware requires IE because that is the browser most novices use who
don't know how to easily avoid spyware. Firefox does support native
plugins so don't
Same animal, different sub-species.
Plugins Java do form an attack vector in FF/Moz just not as an
effective one. Anytime you allow something to extend or run custom code,
you're taking a risk.
Gotta admit I only see IE once or twice a week these days so FF is
working out as a replacement
At 09:39 AM 16/06/2005, Eli Allen wrote:
Just because it doesn't support ActiveX doesn't mean anything. As I said,
spyware requires IE
Except that it avoids all the ActiveX nasties out there. Which is
currently the main infection vector, as I understand it.
is nothing inherent about
What vulnerabilities does ActiveX have that FF doesn't? In both cases you a
prompted if you want to install, and in both cases if you say yes you get
infected.
Eli
- Original Message -
At 09:39 AM 16/06/2005, Eli Allen wrote:
Just because it doesn't support ActiveX doesn't mean
Eli Allen wrote:
Just because it doesn't support ActiveX doesn't mean anything. As I
said, spyware requires IE because that is the browser most novices use
who don't know how to easily avoid spyware. There is nothing inherent
about ActiveX other then it being the popular way of doing things
Because most of the time you're NOT prompted to install.
Eli Allen wrote:
What vulnerabilities does ActiveX have that FF doesn't? In both cases
you a prompted if you want to install, and in both cases if you say yes
you get infected.
Eli
At 10:28 AM 16/06/2005, Ben Ruset wrote:
Because most of the time you're NOT prompted to install.
Aren't you listening Ben? ActiveX only poses a threat to newbies and
idiots. FF is just as dangerous. You heard it here first. :P
T
Eli Allen wrote:
What vulnerabilities does ActiveX
Because ActiveX can ride pre-approved AOX objects and -not- prompt the user
to be installed. This has changed with SP2 in XP, but many users are still
not running that.. prior to SP2, the prompts weren't there for objects that
piggy-backed a zone (pretended to be from approved sources like MS,
have a best data cable modem cmx300
trying to log on with 192.168.100.1 but the usual suspects for pw do not work.
any clues ?
or can this only be accessed by my provider ?
fp
thanks
--
Tallyho ! ]:8)
--
Man loves little and often, woman much and rarely.
I am building a system and since I do a lot of digital photography and
video I would like the best combination of performance and storage
possible. Quiet would be nice too and as such I have been looking at
the 400GB Seagate Barracuda's. Unfortunately there lackluster review on
storage review
Right now everything I have is in Xvid, which I love. But there are
some nice things about Divx 6. It scales up to awesome quality
(comparable to Apple's H.264 some say) and awesome compression (even
smaller file sizes than Xvid).
Just to be picky--Apple had nothing to do with the
I have a Media box built around a P4 Prescott 3.4 that uses a Maxtor
DiamondMax 10 6L300S0 300GB 7200 RPM 16MB Cache Serial ATA150 . I have been
using the original version for about six months, and I just ordered this
SATA II version yesterday to add to it
The real vulnerability that IE has that firefox doesn't is the way it
supports scripting. In IE you can go to a page and never be prompted
anything and have 30mb of crapware installed. Firefox allows you to
control what type of scripting you want to allow. That is a major
benefit however you
I just added a Raptor to the order. With the Raptor as the boot drive
the performance of the data drive becomes a little less critical.I
looked for the larger Hitachi but did not find it listed on NewEgg. The
T7K250 is the same price as the 250G Barracuda. Right now I am trying
to decide
At 03:01 PM 16/06/2005, Mesdaq, Ali wrote:
benefit however you shouldn't feel safe in a ff enviorement either. For
work all I do is research malicious URL's and Malware and we mainly use
Would you mind sharing some of the URLs you are researching so we can test
our systems against them?
T
I have no doubt that the T7K250 is a bit louder than the Barracuda 7200.8.
However, both drives will be quite quiet. (Much quieter than, say, the WD
2500JB drives). Indeed, with any modern drive, noise is not nearly as much
of a concern as it once was.
You would be pretty safe with either
Thanks for the explanation.
Jeff
- Original Message -
From: Brian Weeden [EMAIL PROTECTED]
To: hwg hardware@hardwaregroup.com
Sent: Thursday, June 16, 2005 6:46 AM
Subject: Re: [H] DiVX 6 Released
Why would you have to do that, Brian?
http://www.divx.com/divx/dmf.php
Right now
At 04:06 PM 16/06/2005, Mesdaq, Ali wrote:
What are you looking to do exactly?
I was thinking hardening a system, then taking it to a malicious page, and
see if the hardening protected it.
T
I am getting 2G of RAM (2x1G, that is the max that the Shuttle SN25P
will hold). I like the idea of having a Raptor for the boot drive
and applications and a couple of drives for data. I also added a
Sapphire Raedon X800XL video card (that should make the kids happy).
Thanks to all for you
At 03:25 PM 6/16/2005, Gary Udstrand typed:
I am getting 2G of RAM (2x1G, that is the max that the Shuttle SN25P
will hold). I like the idea of having a Raptor for the boot drive
and applications and a couple of drives for data. I also added a
Sapphire Raedon X800XL video card (that should
Well if you want to test that I have a perl script you can use to test
to see if your machine has any new files on it. So what you can do is
browse sites that are most prone to trying to exploit your browser ie
porn, hacking, misc. Then you run the script and it will display any new
files of
Sure, then you can buy me the PC for Father's Day! :-)
LOL.
-Gary
Wayne Johnson said the following on 6/16/2005 3:00 PM:
At 03:25 PM 6/16/2005, Gary Udstrand typed:
I am getting 2G of RAM (2x1G, that is the max that the Shuttle SN25P
will hold). I like the idea of having a Raptor for
From Securing the Enterprise:
Anti-spyware advocates cry foul as the popular peer-to-peer
protocol becomes the latest mechanism for the stealthy
distribution of adware/spyware bundles.
http://ct.enews.eweek.com/rd/cts?d=186-2159-5-92-42064-245376-0-0-0-1
Robert Turnbull, Toronto, Canada
From: Robert Turnbull [EMAIL PROTECTED]
Reply-To: The Hardware List hardware@hardwaregroup.com
To: hardware@hardwaregroup.com
Subject: [H] BitTorrent
Date: Thu, 16 Jun 2005 19:32:12 -0400
From Securing the Enterprise:
Anti-spyware advocates cry foul as the popular peer-to-peer
protocol becomes
FYI the problem is not with BitTorrent itself but with people
downloading files and malware being hidden the file. Usually they
grab a TV episode and it comes as an .exe or a .rar and when they run
it the malware installs.
I would hope most of the people on this list know not to run random .exes
In the usual places...
--
JRS [EMAIL PROTECTED]
Please remove **X** to reply...
Facts do not cease to exist just
because they are ignored.
LOL. Hacked already. :)
I wonder if the company is happy with this newfound exposure in the media?
Let's look at their website: http://www.marketingmetrixgroup.com/
--
JRS [EMAIL PROTECTED]
Please remove **X** to reply...
Facts do not cease to exist just
because they are ignored.
32 matches
Mail list logo