topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday November 11, 2025, 6:01 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 35 36 37 38 39 [40] 41 42 43 44 45 ... 50next
976
Apparently chrome will also automatically download executables from any URL without prompt. We can see here that Mountain View was obviously exercising the good old head noodle when they added that "feature" *cough*vulnerability*cough*.

Ehtyar.
977
General Software Discussion / Re: Google Chrome -- key reasons for its debut
« Last post by Ehtyar on September 03, 2008, 03:55 PM »
I think Matt Cutts intended to address the EULA problem in his last question...
Q: Dude, this anonymous commenter said that Google claims that they own everything you touch when you run Chrome! Should I be worried?
A: No, of course not. I debunked that misconception last night in a Mashable comment and this morning in a ReadWriteWeb comment. Google does not want to claim the rights to everything you surf or do in Chrome, just like we didn’t want it the time before with Google Docs. :) I’m sure that other Googlers will clarify that point more officially. It is good that people pore through the license and ask these questions though, because if something looks worrisome then we can use that opportunity to make it more clear.
Apparently he's not personally worried about it, and is more than comfortable giving others the impression that this means nothing. Trolls like this could only get popular through the ignorance of Digg.

Ehtyar.

[edit]
He also happily ignores the concerns of yet another group of people.
Q: Another browser? Geez, I’m a webmaster/search engine optimizer/front-end programmer and I don’t want to worry about another browser.
A: Google did not add another rendering engine. Google Chrome uses WebKit for rendering, which is the same rendering engine as Apple’s Safari browser, so if your site is compatible with Safari it should work great in Chrome. Personally, I do think creating clean code that validates and works on many different browsers will be an important skill for webmasters and web designers. These days a smart site owner thinks about how their web site looks to all browsers, from Internet Explorer to Safari to Opera to an iPhone.
Perhaps his brain was a bit bogged down after reading that comic and he missed the fact that Google had to rewrite WebKit in order to have it render a decent amount of pages correctly (23%-99%). He may also want to consider the reports that while Chrome has good standards compliance, it's quirk mode (rendering non-standards-compliant pages) leave a substantial amount to be desired.
978
Living Room / Re: 80% of IT Workers Would Steal Data if Fired
« Last post by Ehtyar on September 03, 2008, 08:13 AM »
I'm still not certain how this article is self-serving. The question you replied to was rhetorical, intended to highlight the ridiculousness of such a claim, though you seem to have caught on to that part...

Ehtyar.
979
With an EULA like that, how could it *not* remain in perpetual beta?

Ehtyar.
980
I knew it wouldn't take long...link.

Ehtyar.
981
General Software Discussion / Re: Best Firefox security addons?
« Last post by Ehtyar on September 03, 2008, 07:20 AM »
Refcontrol is for controlling the sending of the referrer header. You'd be surprised how few sites break using this addon, and it's very simple to create exceptions for those that do break.

Ehtyar.
982
Living Room / Re: 80% of IT Workers Would Steal Data if Fired
« Last post by Ehtyar on September 03, 2008, 07:01 AM »
Be sure you take MouserBot with you joshua; you never know which is more useless, a broken A/C or a broken eggie :P

Ehtyar.
983
They do deserve some credit in one respect. When importing settings from IE, they actually import the default search engine, which is Windows Live. Microsoft certainly wouldn't be as accommodating.

Ehtyar.
984
For anyone concerned about privacy, the installer creates a scheduled task to launch Google Updater that runs, believe it or not, when idle. I suggest removing it immediately.

Ehtyar.
985
Living Room / Re: 80% of IT Workers Would Steal Data if Fired
« Last post by Ehtyar on September 02, 2008, 06:28 PM »
Your interpretation is equally slanted. Your analogy implies that the stealing of data is equal to the termination of employment. How exactly is the story self-serving? Will someone use this article as an excuse to fire all their employees?

Ehtyar.
986
Living Room / "Standard Deviations" of the Average System Administrator
« Last post by Ehtyar on September 02, 2008, 05:03 PM »
Richard Bejtlich highlights many interesting points from the recent ;login: article "Standard Deviations of the Average System Administrator".

Screenshot - 3_09_2008 , 8_01_36 AM_thumb.png


System administrators have a surprising amount in common with electricians. Both professions require intensive training. Both professions are plagued by amateurs who believe (erroneously) that they can do a good job as a professional. Both professions are based upon a shared body of knowledge.

But electricians can call upon several resources that system administrators lack. Electricians have a legally mandated mentorship/apprenticeship program for training novices. They have a well-defined and generally-accepted profession of job grades, from apprentice to journeyman to master. They advance in grade partly through legally mandated apprenticeship and partly through legally mandated certifications. These certifications test for knowledge of a set of standards for practice—again, mandated by law. The regulations are almost universally accepted as essential to assuring quality workmanship, function, and safety.

Full Story
;login:
Full Article (pdf)

Ehtyar.
987
Living Room / 80% of IT Workers Would Steal Data if Fired
« Last post by Ehtyar on September 02, 2008, 04:57 PM »
Nearly 9/10 IT workers  of the 3000 interviewed said they would steal sensitive data if their employment was terminated.

Screenshot - 3_09_2008 , 7_54_27 AM_thumb.png


A study conducted by security company Cyber-Ark indicates that a significant number of corporate IT personnel snoop sensitive data, and nearly 9 out of 10 would take company secrets and remote access credentials with them if they were fired. This could pose a serious security risk for many companies and expose them to industrial espionage and other dangers.

The results of the Trust, Security and Passwords study are based on a survey of 300 system administrators at the Infosecurity 2008 event in Europe. Of the study respondents, 88 percent admitted they would take sensitive data with them when leaving their current place of employment, and approximately one-third said that they would abscond with company password lists. That could be a serious cause for concern for companies that have complex and loosely secured technological infrastructure.

Full Story

Ehtyar.
988
Living Room / New Security Rules for Credit Card Handlers
« Last post by Ehtyar on September 02, 2008, 04:50 PM »
Merchants handling credit cards would be subject to new security rules as early as October, though it appears new implementations of WEP will be permitted until mid next year, and existing installations may continue longer than that. The current standard also recommends disabling SSID broadcast. Sounds like a security joke to me.

Screenshot - 3_09_2008 , 7_45_44 AM_thumb.png


Companies that handle credit cards can expect to see revised security rules released in early October, according to the group responsible for maintaining the Payment Card Industry security standard for storage and processing of credit and debit cards.

The next version of the 12-part PCI Data Security Standard is aimed at clarifying questions that merchants and service providers had regarding the current PCI DSS 1.1 standard, says Bob Russo, general manager of the PCI Security Standards Council. Some changes in the forthcoming Version 1.2 may prompt merchants and service providers to make adjustments in their security practices to achieve PCI compliance in the future, he adds.

Full Story

Ehtyar.
989
Living Room / Public Support for McKinnon Grows
« Last post by Ehtyar on September 02, 2008, 04:43 PM »
The alleged NASA hacker Gary McKinnon has public support rallying in favor of him.

Screenshot - 3_09_2008 , 7_44_12 AM_thumb.png


Last week's decision by the European Court of Human Rights to ignore the pleas of Gary McKinnon's solicitors to have him tried in the UK prompted a peaceful demonstration outside the Home Office.

The possibility of McKinnon being extradited could lead to his incarceration for 70 years and fines worth millions of pounds.

Full Story

Ehtyar.
990
For those interested, the source can be found here, more info here. Before you get too excited, the tarball is 430mb, and extracted will occupy 1.6 gb of hard drive space. you will also need msvc 05 and the 08 sdk. Build can take up to 40 minutes and, inclusive of msvc and the sdk, will occupy roughly 10gb of space.

Ehtyar.
991
Like fenixproductions, I just installed and I'm already pissed:
1. You can only get download from google's website.
2. Installer attempts to acquire SeDebugPrivilige.
3. Attempts to install autorun for google updater.
4. Has 3 levels of extraction/installation after download.
5. Uses non-standard appdata folder for installation.
6. Between the 3 instances it apparently needs to load youtube, it's using just over 50mb of memory, which is 15 more than baseline Firefox 3 needs for the same.

Ehtyar.
992
I agree wholeheartedly with most of the concerns expressed here in this thread, though I can't understand what all the fuss is about. Google is simply being opportunistic, and only those ignorant enough not to see it will be affected.  You may try and try again to reach these people, but they are the same type of person who uses stock standard IE...they simply don't care.
As mwang has suggested, none of us will miss out on features; Google stole features from every other browser on the market, and the Firefox development community will respond in kind. IMO this browser is nothing for most of us to worry about, except to concern ourselves with the plight of those willing to use this browser, and the damage its use may cause to Net Neutrality.

Ehtyar.
993
Living Room / Re: SWF Redirects In SPAM
« Last post by Ehtyar on September 01, 2008, 02:22 AM »
IMO Flash has always been given far too much power/freedom on an operating system to *not* be used for nefarious purposes. In relation to this, Flash end-users should also take Local Shared Objects into consideration when deciding whether or not to permit a flash application to run on their PC.

Ehtyar.
994
Living Room / Re: Internet Explorer 8 Privacy Features Leaks Private Info.
« Last post by Ehtyar on September 01, 2008, 02:15 AM »
I certainly see your point, however, it does not take a "security expert" to go nosing through the browser's cache.
Even more data is stored in the browser's cache, a feature designed to speed up performance of websites by storing a copy of recently accessed information on a user's hard disk. InPrivate Browsing failed to disable this feature.
In all fairness this is a beta, it will be interesting to see if Microsoft at least fixes this problem in the final.

Ehtyar.
995
Living Room / Re: IPhone Security Hole Bypasses Password
« Last post by Ehtyar on August 31, 2008, 08:13 PM »
In all honesty I'd probably prefer an IPhone to an iPod. My sister had one a while back, the battery stopped function two weeks after her warranty expired (a known problem with the iPod, for which Americans receive free replacements thanks to a class action lawsuit, and for which Australians get jack s**t). After having it replaced at her cost, the iPod itself stopped functioning within two months. Both her and I agreed - never again.

Ehtyar.
996
Living Room / Re: More On Best Western Attack
« Last post by Ehtyar on August 31, 2008, 05:25 PM »
No probs :) Thanks for responding to my posts, it's nice to know people find this interesting too :D

Ehtyar.
997
Living Room / Re: More On Best Western Attack
« Last post by Ehtyar on August 31, 2008, 05:16 PM »
You missed the first Best Western post. The attackers stole credit card details in addition to customer information.

Ehtyar.
998
Living Room / More On Best Western Attack
« Last post by Ehtyar on August 29, 2008, 04:30 PM »
While Best Western continue to denounce claims their entire European database was compromised, reporters dig up the dirt. I'm not usually a fan of sensationalism, but there's some interesting details in this article.

Screenshot - 30_08_2008 , 7_29_08 AM_thumb.png


Conflicting claims by Best Western and Glasgow's Sunday Herald over the scope of a recent security breach have been put under the microscope by security watchers. The paper claims that eight million records were potentially exposed, while the hotel insists only ten records were accessed.

Register readers familiar with Best Western systems said that the issue turns on whether the compromised PC was able to access the hotel chain's worldwide reservation system or only local data. The issue of whether archived data on guest records was accessible from the infected PC also comes into play.

Full Story

Ehtyar.
999
Living Room / Fast Flux Beating Security Industry
« Last post by Ehtyar on August 29, 2008, 04:24 PM »
Hackers are employing a new technique to keep their malicious sites one server ahead of law enforcement.

Screenshot - 30_08_2008 , 7_24_33 AM_thumb.png


In the continuing computer security arms race, a technique called fast flux is the bad guys' latest way of thwarting attempts to shut down phishing scams and other Web nasties.

Fast flux was first seen around two years ago, according to Derek Manky, security researcher with Fortinet Inc. in Vancouver. Around a year ago it became popular with operators of botnets - networks of computers belonging to unsuspecting users and infected with bots, allowing them to be controlled remotely and used for phishing and other scams.

Full Story

Ehtyar.
1000
Living Room / SWF Redirects In SPAM
« Last post by Ehtyar on August 29, 2008, 04:20 PM »
Attackers are using ActionScript to force visitors to their sites from legitimate sites. Just another reason to be using NoScript

Screenshot - 30_08_2008 , 7_19_08 AM_thumb.png


One of the new trends in spam e-mails used for malware distribution is the use of maliciously crafted SWF files hosted on legitimate servers. The ActionScript code of the files includes a redirect that takes users to websites that host malware or prompts them to download the malware directly.

Full Story

Ehtyar.
Pages: prev1 ... 35 36 37 38 39 [40] 41 42 43 44 45 ... 50next