L
Lius
using Win98SE on a P4 is like using a car instead of a bicycle to the next block
to get some groceries
to get some groceries
Jari said:Why?
I use Maxthon and I am very pleased with it. And don't tell me about
geckos better security after those very critical Firefox-holes.
J.
Yes, I just love how you can get extensions for practically anything!
I've never had a browser that was so in tune with my needs. I'm still
missing out on a thing or two, mainly how easy it is to save webpages
in IE with the source URL automatically dumped within the html code of
the saved page. So I just have an extension for opening a page in IE
when I need to save pages <g>. FF rocks.D
using Win98SE on a P4 is like using a car instead of a bicycle to the next block
to get some groceries
casioculture said:The "very critical Firefox-holes" is actually one, not two. In my
opinion nothing more than a minor teething problem for a very young
browser, compared to IE which should've been very mature by now and
got over its security scares, but is far from it. Besides, the Mozilla
foundation responded immediately and let everyone know on day zero and
before anything got in the wild, posted instructions on what people
should do (tick off allowing websites to install software; couldn't be
simpler), even took the rather extreme protective measure of disabling
its update site, and is working on a fix. Compare this with Microsoft
where security vulnerabilities go on for months without an adequate
response.
Common sense does not always help, even the most knowledgeable of
users can get caught out.
I agree that the Moz. folks respond much faster than the folks
from Redmont, and that IE had many, many security related
problems... all true, but... FF is just a program, it ain't
religion, nor a cult... just a program, and programs have bugs
which can be security related.
I probably will get fried to a crisp over this, since the "Hail
the Almighty FireFox" attitude here, if so... then so be it!
Security issues aside, Maxthon & Avant are fine as far as they
go, but I switched to FF because it's more configurable.
Yes, I just love how you can get extensions for practically anything!
I beg to differ. I can configure FireFox in 1 day. It takes 2 days to
go through all the config in Maxthon.![]()
I love how Maxthon can do just about anything without messing with
tedious extensions.
The "very critical Firefox-holes" is actually one, not two. In my
opinion nothing more than a minor teething problem for a very young
browser, compared to IE which should've been very mature by now and got
over its security scares, but is far from it. Besides, the Mozilla
foundation responded immediately and let everyone know on day zero and
before anything got in the wild, posted instructions on what people
should do (tick off allowing websites to install software; couldn't be
simpler), even took the rather extreme protective measure of disabling
its update site, and is working on a fix. Compare this with Microsoft
where security vulnerabilities go on for months without an adequate
response.
I beg to differ. I can configure FireFox in 1 day. It takes 2 days to go
through all the config in Maxthon.
-- Bob
Total crap.
There were 3 critical security issues with Firefox in
March that were known by the developers for close to 3 weeks
before the alert and a patch was released.
Sample code was available:
http://secunia.com/advisories/14654/
https://bugzilla.mozilla.org/show_bug.cgi?id=285438 (March 11)
https://bugzilla.mozilla.org/show_bug.cgi?id=284627 (March 3)
https://bugzilla.mozilla.org/show_bug.cgi?id=285595 (March 10)
No users alerts were released until the patch was released on
March 23.
So you were vulnerable for weeks
but Mozilla decided you really didn't need to know about it.
Of course when Microsoft does this everyone has a tantrum
but apparently Mozilla can do no wrong?!
That compares very favorably with Microsoft's record of leaving
vulnerabilities unpatched for months even though there are exploits in
the wild.
You mean the patches that were proposed for testing on the dates you
give below? Surely you don't want them releasing untested patches.
Not even Microsoft do that.
Indeed. It's a shame these latest ones were leaked before the Mozilla
developers could finish closing the hole.
Longer than that -- all versions prior to 1.0.2 were
vulnerable -- though no one was exploiting the vulnerabilities, since
they were not published and no one malicious had found out about them.
You didn't need to know about it. Would you actually prefer that
Microsoft and the Mozilla Foundation publicize vulnerabilities before
patching them? If so, why?
What about telling the users they are vulnerable and a workaround
(if available) until the patches are ready?
It's a shame that you were vulnerable but nobody bothered to
inform you so you could take appropriate action.
What do you mean by not published?
It may not have been common knowledge but the above links give
sample code and are readily accesible by anyone who want's to take
advantage of the vulnerabilities.
That's like saying your car has faulty brakes but you don't need
to know about it until we have a fix!
If the developers know of a vulnerability I want to be informed of
it regardless of wether or not a patch/workaround is available.
Especially if it's a 'critical' vulnerability. This gives ME the
choice of wether or not I wish to expose myself to a potential
threat.
Sheesh, you're just stupid aren't you?What about telling the users they are vulnerable and a workaround
(if available) until the patches are ready?
It's a shame that you were vulnerable but nobody bothered to
inform you so you could take appropriate action.
What do you mean by not published? It may not have been common
knowledge but the above links give sample code and are readily
accesible by anyone who want's to take advantage of the
vulnerabilities.
That's like saying your car has faulty brakes but you don't need
to know about it until we have a fix!
If the developers know of a vulnerability I want to be informed of
it regardless of wether or not a patch/workaround is available.
Especially if it's a 'critical' vulnerability. This gives ME the
choice of wether or not I wish to expose myself to a potential
threat.
Fuzzy said:If the developers know of a vulnerability I want to be informed of it
regardless of wether or not a patch/workaround is available. Especially if
it's a 'critical' vulnerability. This gives ME the choice of wether or not I
wish to expose myself to a potential threat.
What about it? Note that Microsoft don't do that either, unless
someone else publishes the vulnerability before they have a patch
ready.
Why is this a shame? Nothing was exploiting the vulnerabilities.
I mean that no one was making info about them publicly available.
The above links were not readily accessible until after the the
vulnerabilities were patched.
You can't have it both ways. You noted repeatedly that the info was
withheld from the public, and you were quite critical of that. Now
you want to claim (incorrectly) that the info was publicly available
so you can criticize that.
Not as bad as some of your analogies, but that one is bad enough for
me not to waste time dealing with it. I'll just point out that
Microsoft also, ahem, try to kill people by letting them drive
unaware with faulty brakes.
Too bad. Neither mozilla.org nor Microsoft are going to inform you
about unexploited vulnerabilities.
And it would give malicious hackers the choice to exploit the
vulnerabilities. The need to keep that choice from them clearly
overrides your wants. Luckily, despite your unhappiness with it,
the policy also does not expose you to any exploits.
That we know of.
I wasn't aware of that.
And they have and should be be condemned for such practices.
I'd be curious to know how they know they haven't been exploited.
The fact is I am exposed.
There is a known vulnerability (who knows is the big question).
I would like to be able to determine wether or not I wish to take
that chance or consider other options. This decision unfortunately
doesn't appear to be mine to make. Security by obscurity is not a
good practice.