Would you like to manage a network of 10,000 people using tools that can en 
masse head off problem, and tools designed with managing updates on a bulk 
basis, or would you like to manually install or patch 10,000 separate accounts 
with Firefox? In the sector I work in, that's the real-world question.

When you start to get into the scale of things, the answers change greatly. And 
remember, in most cases these are networks made up of mostly non-technical 
people. To many, a web browser is a web browser is a web browser. They don't 
care about anything other than "will it get me to the site I want?", so the 
cool factor of Firefox is negligible. It has to work, and be easy to maintain.

Should Firefox become easy to manage over a network in large scale, then it 
will become a much more major player in the intranet arena.


thanks 
-r 
_____________________________________ 
Rob Barthle 
Contractor - Sr. Software Developer 
[EMAIL PROTECTED] 
202-245-6484 



-----Original Message-----
From: Munson, Jacob [mailto:[EMAIL PROTECTED]
Sent: Friday, February 24, 2006 12:05 PM
To: CF-Talk
Subject: RE: Developing for 800 x 600 on monitor at higher resolution


This is all great, but wouldn't it be easier to just use a secure
browser?  :)  If I wanted to live in a tank, so I could be safe, I
could.  But I prefer to live on beach front property, and I still feel
safe.

> -----Original Message-----
> From: Dave Watts [mailto:[EMAIL PROTECTED] 
> Sent: Friday, February 24, 2006 9:59 AM
> To: CF-Talk
> Subject: RE: Developing for 800 x 600 on monitor at higher resolution
> 
> > Secunia clearly states the 22 unpatched holes have no 
> > work-arounds.  But I don't know what that means.  I'm 
> > assuming it means that if you disable active-x, take away 
> > admin rights, install firewalls, etc., you still are 
> > vulnerable.  These viruses are NOT taking advantage of 
> > built-in technologies, like active-x.  They are exploits of 
> > buffer overflow holes.  You click a link, and the site loads 
> > executable malicious code into the machine's memory.  Will 
> > that code still execute if you don't have admin rights?  I 
> > don't know.  But what if the virus just grabs all of your 
> > browser history?  What if you've got a lot of sensitive data 
> > in your browser cache, like government secrets?
> 
> You don't really need to assume anything. It's all spelled 
> out right there
> on secunia.com.
> 
> If you read each of the 22 advisories for unpatched issues, 
> you'll see that
> about half can be avoided by disabling Active Scripting or ActiveX
> functionality for untrusted sites. Out of the 22 listed, I 
> saw one that was
> a buffer overflow - the .mht web archive exploit. However, 
> according to the
> advisory, that overflow doesn't allow you to execute code, 
> only to crash the
> user's browser.
> 
> Out of the 22 advisories, most were "not critical", some were "less
> critical", and three were "moderately critical". One was 
> "highly critical" -
> an ActiveX problem.
> 
> As for buffer overflows in general, they execute within the 
> security context
> of the user running the process in which the overflow occurs. 
> Most buffer
> overflow attacks rely on the ability to achieve administrator 
> access, to do
> things which are generally useful to the attacker. Of course, 
> a successful
> buffer overflow could mess with user data even without administrative
> rights.
> 
> If you have a lot of sensitive data in your browser cache, 
> like government
> secrets, I would hope that your network administrator limits 
> your access to
> non-sensitive data from that location. This is standard practice in
> high-security government environments, from what I understand.
> 
> Dave Watts, CTO, Fig Leaf Software
> http://www.figleaf.com/
> 
> Fig Leaf Software provides the highest caliber vendor-authorized
> instruction at our training centers in Washington DC, Atlanta,
> Chicago, Baltimore, Northern Virginia, or on-site at your location.
> Visit http://training.figleaf.com/ for more information!
> 
> 
> 



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Message: http://www.houseoffusion.com/lists.cfm/link=i:4:233395
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to