Comment Re:Except that under the U.S. Constitution... (Score 1) 345
Huh... are you against eating mutton?
Huh... are you against eating mutton?
Drive-by downloads are not typically downloaded by your browser (except in the case of exploits targeting vulnerabilities in the browser itself). They are usually downloaded by browser plugins (such as Flash, Adobe Reader, various ActiveX controls, etc.) that contain vulnerabilities that are exploited (either via JavaScript or by specially crafted media files), and the payload of the exploit (the "shellcode") downloads and executes some Trojan EXE. It has absolutely nothing to do with downloads that are initiated by your browser via Java Script (which must always be authorized by the user in all major browsers, generally via a Save/Open/Cancel dialog).
I bought a Brother printer a few months ago when my Canon printer became irreparably clogged. It has worked quite well for me so far. The ink even comes in individual per-color cartridges.
I wonder how many times this vulnerability was used to deliver malware.
If you look at the pictures in TFA, you'll note that they've moved Print Screen to share space with the Insert key. To invoke Print Screen instead of Insert, you have to hold down the Fn key.
according to TFA:
Malware description
Threatname: Backdoor.Win32.Buzus.croo
Aliases: Trojan-PWS.Win32.Lmir (Ikarus, a-squared); TR/Hijacker.Gen (AntiVir); Trojan/Win32.Buzus.gen (Antiy-AVL); W32/Agent.S.gen!Eldorado (F-Prot, Authentium); Win32:Rootkit-gen (Avast); Generic15.CBGO (AVG); Trojan.Generic.2823971 (BitDefender, GData); Trojan.Buzus.croo (Kaspersky, QuickHeal); Trojan.NtRootKit.2909 (DrWeb); Trj/Buzus.AH (Panda).
That's the trojan that's being installed by the exploits served up by the injected IFRAME. It is not the vulnerability that is allowing the IFRAME to be injected to begin with.
ISP contacts customer, says "you appear to have a virus that is doing bad things on the network. Please fix it." or pops a web page with the same message and probably a link to an antivirus solution.
Popping up a web page would be an extraordinarily bad idea, given how many popup/banner ads, malicious web pages, and adware are already out there selling fake antivirus software.
Oh noes! If only we had a way to detect and filter text that looks like spam....
I wish the Tomcat developers would read RFCs. Or perhaps they consider it a "feature" that I can undeploy my webapp by hitting my browser's Back button while logged into the Manager application....
They can define the term "bit" to mean whatever they want for that legal document. However, if they make any promises about bandwidth, the same definitions apply. So, if, for example, they are guaranteeing you 10 megabits/second bandwidth, that had better mean you can download a 100MB file in 10 seconds.
Also for visually impaired people,
it may be the sole mean of avoiding cars.
And for the deaf people?
I'd imagine that they'd fare the same way they currently do against normal cars.
In any case, everyone knows that if your Nintendo games don't work properly, all you need to do is blow the dust out of the cartridge.
Well then, as I said before, that's a standard feature in Opera.
Me too.
Less than a minute? Wow! That's almost as fast as the four seconds it takes in my browser!
I've always been fascinated by the fact that disabling scripting in FireFox requires a plugin. In Opera, all you do is click a checkbox in a drop-down menu (or to do it per-site, a checkbox in a dialog window). The same goes for enabling/disabling plugins, applets, sound, cookies, animated images, popups (actually a set of radio buttons and not a checkbox), proxy servers, and sending referer information. It seems to me to be an excessive amount of work to have to install additional software just to get basic security features.
And yes, I'm an Opera fanboy.
The hardest part of climbing the ladder of success is getting through the crowd at the bottom.