Network Security guide for the home or small business network – Part 14 – Alternative software



There are ways that risks can be avoided. Recently, there was what was called a zero-day exploit for Internet Explorer. As I write this, the exploit surfaced 3 weeks ago and tomorrow there will be a patch. The vulnerability would allow remote code execution through a vulnerability in the way javascript is handled. So, for that 3 week unpatched period, Internet Explorer in it’s default configuration is a sitting duck. Well, truth be told, there are other browser vulnerabilities, many unpatched. (That’s a common method for many spyware bugs to install.)


One possibility is to install a less targetted browser like Mozilla Firefox, or Opera. There are fewer known vulnerabilities for those browsers and they don’t seem to be as big targets as Internet Explorer. Will that always be the case? I don’t know, time will tell. It is definitely worth paying close attention to.

Another vector for viruses of course, is your mail program. Eudora is an alternative mail program as is Mozilla Thunderbird. In many cases moving to alternative software can lower your risk of being infested.

Likewise, a move to Apple or Linux can lower your exposure compared to Windows. You shouldn’t assume that those platforms will always be more secure. Ultimately the security of a platform comes down to much more as I hope this series is bringing to light.

Related Posts

Blog Traffic Exchange Related Posts
  • Web smarts is the main defence against spyware Over at the Security Fix, Brian Krebs is talking about spyware and the fact that keeping up-to-date on patches, and running current antivirus with current definitions is not enough to protect your machine from spyware. He sums it up by saying common sense is the best defence. Through the course......
  • How to Remove AntiSpyware Shield Pro | AntiSpyware Shield Pro Removal AntiSpyware Shield Pro is a rogue antivirus that typically is installed via trojans or other malware. Once it's invited itself onto the system it will do all sorts of things. It will popup warnings about the computers security. It will scan the computer for viruses and find many files that......
  • Exploits a plenty - IE / Excel (Firefox?) There are a number of vulnerabilities that are currently unpatched, but have working publicly known exploits for Excel (*2) and Internet Explorer (2 vulnerabilities here as well.) Proof of Concept code has been released for both the Excel and Internet Explorer vulnerabilities. This means, with the code publicly available, it......
Blog Traffic Exchange Related Websites
  • Solidifying WP Security Designed with PHP, and powered by mySQL directories, WordPress is used by an amazing 8.5% of all websites. Web delivered spyware and web page hacking are becoming progressively more common. With such a lot of web content using WordPress as a CMS, any security weaknesses in the CMS structure or......
  • Finding Antiques and Collectibles If you are interested in the art of antiquing, then you should know that there are antiques and collectibles that you can find in all shapes, all sizes and all kinds of locations. All of these antiques and collectibles have history, a past, a story to them. People can find......
  • Electronic Books Need Internet Programs To Successfully Prosper ? E-book While starting your individual associates program is common sense, it truly is can often become a little bit hard to do. In today?s world of online shopping, namely for e-books, you are allowed the most beneficial product, nonetheless it won?t matter if consumers don?t know that it exists. That's the......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site