Post by p***@never.hereOn Sun, 03 Jun 2012 14:01:25 +0100, Tom Gardner
Post by Tom GardnerPost by p***@never.herePost by Tom GardnerPost by p***@never.herePost by Tom GardnerThere are, I believe, JavaScript attack vectors that target
the browser's operation. These are inherently agnostic as to
the o/s that is running the browser, and a pig to spot since
they don't modify anything on the hard disk.
Some claim that the upcoming HTML5 offers new scope for
such attacks, particularly in w.r.t. DDoS attacks. IMHO
that remains to be proven or disproven.
Thanks for the reply Tom. I'm using FF 12. Will the "noscript" add-on
help to protect against this type of attack?
I presume so, but it does also protect you against many useful sites :(
But you can allow individual sites on a temporary or permanent basis.
Just so.
Post by p***@never.herePost by Tom GardnerIf those sites themselves serve up attacks, which isn't unknown,
then naturally it can't help.
True. One of the things I do, as I mentioned up top, was online
banking. If sites like Barclays get compromised and start attacking
their customers they have far bigger problems than me. If the worst
comes to the worst I can always reinstall from scratch again :)
Best way for that kind of site is to have a "live CD" of, say,
ubuntu, on a USB stick, and then to boot from that. You are
- a pristine o/s and browser
- no viruses/trojans
- no keyboard sniffers
to the standard demanded by the factory's manufacturing quality
assurance!
It will protect you against persistent problems such as
http://catless.ncl.ac.uk/Risks/26.87.html#subj10.1
It won't protect you against problems in the boot/bios, but
the only thing that will deal with that is TPM/Palladium,
which has other deleterious effects.
Halfway house is to boot the live CD in a virtual machine,
which is what I do.
Interesting that you feel the need to go to that extreme when
using Linux. As I assume you are?
I am doing that, but I don't feel it is extreme since
it is quick, easy and simple:
- 75s wall-clock time enables me to boot ubuntu
from an iso in a virtual machine *and* open
firefox and connect to the default web page
- it takes maybe 30s to boot my normal firefox in my
o/s
so it is effectively a painless way of removing a
notable set of attack vectors.
Quite an easy decision, really.
Post by p***@never.hereI've never felt the need to do that all the time I've been using
online banking while using Win XP or 7. Never been aware of
any problem although I did run Kaspersky IS, Ad-aware etc.
What makes you think you would have noticed any problems?
Post by p***@never.hereAre you being over cautious
Possibly, but it is painless, so I haven't lost
anything significant (nor money :)
I look both ways before I cross the road even
though I expect that cars would stop before they
hit me. Why? Because it is a simple easy precaution
that could avoid a very nasty rare outcome.
Post by p***@never.hereor is linux that insecure?
No.
The consensus is that there is no intrinsic
security difference between open source software
and proprietary closed source software.
In practice the bad guys are extremely
pragmatic and focus their attacks on the majority
system. On the desktop that is windows, in the
mobile arena that is android (which is a layer
on top of a linux kernel).
Post by p***@never.hereShould I stay with Windows?
That's your choice. Windows is a good gaming
platform, but everything else is easier and
cheaper with linux!
My daughters windows laptop had a hard drive
blow up. Microsoft refused to let me reinstall
the o/s even though I had the o/s and product key,
saying it was Samsung's problem, Samsung said
it was Microsofts responsibility, but they could
do it for £70+disk. It took 90 mins on the phone
to find that out.
It took me 40mins to install ubuntu for free, and
add 60mins for a full system security update.
Full Windows updates seem to take around 24 hours.
Guess which I chose. Not difficult, really.