Would you like to manage a network of 10,000 people using tools that can en masse head off problem, and tools designed with managing updates on a bulk basis, or would you like to manually install or patch 10,000 separate accounts with Firefox? In the sector I work in, that's the real-world question.
When you start to get into the scale of things, the answers change greatly. And remember, in most cases these are networks made up of mostly non-technical people. To many, a web browser is a web browser is a web browser. They don't care about anything other than "will it get me to the site I want?", so the cool factor of Firefox is negligible. It has to work, and be easy to maintain. Should Firefox become easy to manage over a network in large scale, then it will become a much more major player in the intranet arena. thanks -r _____________________________________ Rob Barthle Contractor - Sr. Software Developer [EMAIL PROTECTED] 202-245-6484 -----Original Message----- From: Munson, Jacob [mailto:[EMAIL PROTECTED] Sent: Friday, February 24, 2006 12:05 PM To: CF-Talk Subject: RE: Developing for 800 x 600 on monitor at higher resolution This is all great, but wouldn't it be easier to just use a secure browser? :) If I wanted to live in a tank, so I could be safe, I could. But I prefer to live on beach front property, and I still feel safe. > -----Original Message----- > From: Dave Watts [mailto:[EMAIL PROTECTED] > Sent: Friday, February 24, 2006 9:59 AM > To: CF-Talk > Subject: RE: Developing for 800 x 600 on monitor at higher resolution > > > Secunia clearly states the 22 unpatched holes have no > > work-arounds. But I don't know what that means. I'm > > assuming it means that if you disable active-x, take away > > admin rights, install firewalls, etc., you still are > > vulnerable. These viruses are NOT taking advantage of > > built-in technologies, like active-x. They are exploits of > > buffer overflow holes. You click a link, and the site loads > > executable malicious code into the machine's memory. Will > > that code still execute if you don't have admin rights? I > > don't know. But what if the virus just grabs all of your > > browser history? What if you've got a lot of sensitive data > > in your browser cache, like government secrets? > > You don't really need to assume anything. It's all spelled > out right there > on secunia.com. > > If you read each of the 22 advisories for unpatched issues, > you'll see that > about half can be avoided by disabling Active Scripting or ActiveX > functionality for untrusted sites. Out of the 22 listed, I > saw one that was > a buffer overflow - the .mht web archive exploit. However, > according to the > advisory, that overflow doesn't allow you to execute code, > only to crash the > user's browser. > > Out of the 22 advisories, most were "not critical", some were "less > critical", and three were "moderately critical". One was > "highly critical" - > an ActiveX problem. > > As for buffer overflows in general, they execute within the > security context > of the user running the process in which the overflow occurs. > Most buffer > overflow attacks rely on the ability to achieve administrator > access, to do > things which are generally useful to the attacker. Of course, > a successful > buffer overflow could mess with user data even without administrative > rights. > > If you have a lot of sensitive data in your browser cache, > like government > secrets, I would hope that your network administrator limits > your access to > non-sensitive data from that location. This is standard practice in > high-security government environments, from what I understand. > > Dave Watts, CTO, Fig Leaf Software > http://www.figleaf.com/ > > Fig Leaf Software provides the highest caliber vendor-authorized > instruction at our training centers in Washington DC, Atlanta, > Chicago, Baltimore, Northern Virginia, or on-site at your location. > Visit http://training.figleaf.com/ for more information! > > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Message: http://www.houseoffusion.com/lists.cfm/link=i:4:233395 Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4 Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4 Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4 Donations & Support: http://www.houseoffusion.com/tiny.cfm/54