Escolar Documentos
Profissional Documentos
Cultura Documentos
@HUYNT
DATABASE
GENERAL IT ABOUT
J2EE DEVELOPMENT
WEBLOGIC
JAVA CERTIFICATIONS
R ECEN T P O S T S
1 . I am saf e b ec ause I n ever visited porn w eb site Wrong. Nowadays, many more malware infection are linked to visit to legitimate and popular websites than porn or counterfeit sites. According to Cisco 2013 Annual Security Report, Business/Industry site category stands at 3rd position behind advertising and dynamic content categories in the top 20 dangerous website categories. Included are Shopping (8th), Travel (9th), News (13th). Porn or counterfeit products (e.g. cheap Viagra) didnt make it to top 20. 2. I am saf e b ec ause I use Chrom e or Firef ox If you ever think only noob use IE, then youre not safer using Chrome or Firefox than if you use IE. Because if the more highly skills people uses Firefox or Chrome, the higher probability that someone will discover or learn of security vulnerability in those browsers and exploit it for evil purpose. In addition, as marketshare of Chrome and Firefox increases, they become more lucrative targets for hackers. Furthermore, Microsoft has made significant improvement in protecting its products and their users. An recent test founds that using IE 10 is safer than using Chrome or Firefox. 3. I am saf e b ec ause I am ac c essin g b ehin d a c orporate proxy an d f irew all Corporate invests a lot in security protection by equipping their networks with firewall, DMZ and proxy so it must be safe to access from behind such tools, right?
huynt.wordpress.com/2013/05/18/myths-of-secure-web-browsing/
[Unix] Difference between [ and [[ syntax [Unix] Find the location of the executables [Unix] Recursive listing files under a directory [Database] EXISTS or INNER JOIN: Duplicate records To check which form of String comparison is supported
AR CH I V ES
August 2013 July 2013 June 2013 May 2013 December 2012 October 2012 August 2012 July 2012 June 2012 May 2012
1/3
8/25/13
Wrong. For 3 reasons: - First, 83% of web malware are in the form of script or iframe (Cisco report) which can easily passthrough all above mentioned security products. - Second, more and more corporate allows their user to access multimedia and web 2.0 sites. Such highly dynamic and interaction sites often requires running of executable code. This increases the risk of exploiting known or unknown browsers vulnerabilities. - Third, firewall, DMZ and proxy are are part of a protection called perimeter security and therefore are ineffective in protecting user from malicious insider.
CAT EG O R I ES
Database Family Internet Java JSR 303 Bean Validation Miscellaneous SCBCD SCJP Script SCWCD Spring
Share this:
Press This
Uncategorized
T AG CLO U D
Like this:
Like
Be the first to like this.
Leave a Reply
Enter your comment here...
list
Security
Spring MVC
String comparison Transaction JSR 303 Bean Validation Let Your Bean Validate Itself To check which form of String comparison is supported Management Tuoitre newspaper
unix
M ET A
Site Admin Log out Entries RSS Comments RSS Blog at WordPress.com.
huynt.wordpress.com/2013/05/18/myths-of-secure-web-browsing/
2/3
8/25/13
huynt.wordpress.com/2013/05/18/myths-of-secure-web-browsing/
3/3