Something to think about GPL software
http://news.cnet.com/8301-27080_3-10417785-245.html
Firefox, Adobe top buggiest software list
Not exactly high-quality journalism:
"vulnerabilities" ≠ "bugs"
"vulnerabilities" ≠ actual exploits
I guess at least they recognise that:
"reported vulnerabilities" ≠ "vulnerabilities"
"vulnerabilities" ≠ "bugs"
"vulnerabilities" ≠ actual exploits
I guess at least they recognise that:
"reported vulnerabilities" ≠ "vulnerabilities"
Do you know a good gtkdialog program? Please post a link here
Classic Puppy quotes
ROOT FOREVER
GTK2 FOREVER
Classic Puppy quotes
ROOT FOREVER
GTK2 FOREVER
Maybe I've been living in a Linux cave for too long:
Microsoft Office isn't an operating system... and since when was it a huge focus for attacks? The focus used to be Windows via Internet Explorer.
They don't mention any evidence for this... is it true?The numbers illustrate the trend of attackers turning their focus away from operating systems and toward applications, Kandek said.
Code: Select all
"Operating systems have become more stable and harder to attack and that's why attackers are migrating to applications, he said. "Adobe is a huge focus for attacks now, around 10 times more than Microsoft Office.
Do you know a good gtkdialog program? Please post a link here
Classic Puppy quotes
ROOT FOREVER
GTK2 FOREVER
Classic Puppy quotes
ROOT FOREVER
GTK2 FOREVER
Yes: "don't use GPL software, they'll actually confess to all the bugs when they fix them".Something to think about GPL software.
I want to hear from someone who's actually suffered from one of these vulnerabilities in Firefox being exploited...
Do you know a good gtkdialog program? Please post a link here
Classic Puppy quotes
ROOT FOREVER
GTK2 FOREVER
Classic Puppy quotes
ROOT FOREVER
GTK2 FOREVER
You are totally right disciple,disciple wrote:Not exactly high-quality journalism:
"vulnerabilities" ≠ "bugs"
"vulnerabilities" ≠ actual exploits
I guess at least they recognise that:
"reported vulnerabilities" ≠ "vulnerabilities"
vulnerabilities = security risk.
A vulnerability with some instances of working and fully-implemented attacks is classified as an exploit.
Although they don´t mention any evidence, in Windows side is totally clear that focusing in Internet Explorer is a fast way to attack the Operating System (as you already pointed), IE is integrated in Windows kernel making it the big gate for any attack.disciple wrote:Maybe I've been living in a Linux cave for too long:They don't mention any evidence for this... is it true?The numbers illustrate the trend of attackers turning their focus away from operating systems and toward applications, Kandek said.
Microsoft Office isn't an operating system... and since when was it a huge focus for attacks? The focus used to be Windows via Internet Explorer.Code: Select all
"Operating systems have become more stable and harder to attack and that's why attackers are migrating to applications, he said. "Adobe is a huge focus for attacks now, around 10 times more than Microsoft Office.
With that in mind Microsoft had doing many changes to IE security, many features are default disabled and many program Permissions blocked. I must add that with default settings I can´t use IE for many enterprise Web applications. The worst thing is I Usually have to force the lowest security setting to make things work, even setting a trusted site is not enough for single signon authentication or Scripts executions. I don´t have such problems with Firefox.