Network Security guide for the home or small business network – Part 14 – Alternative software



There are ways that risks can be avoided. Recently, there was what was called a zero-day exploit for Internet Explorer. As I write this, the exploit surfaced 3 weeks ago and tomorrow there will be a patch. The vulnerability would allow remote code execution through a vulnerability in the way javascript is handled. So, for that 3 week unpatched period, Internet Explorer in it’s default configuration is a sitting duck. Well, truth be told, there are other browser vulnerabilities, many unpatched. (That’s a common method for many spyware bugs to install.)


One possibility is to install a less targetted browser like Mozilla Firefox, or Opera. There are fewer known vulnerabilities for those browsers and they don’t seem to be as big targets as Internet Explorer. Will that always be the case? I don’t know, time will tell. It is definitely worth paying close attention to.

Another vector for viruses of course, is your mail program. Eudora is an alternative mail program as is Mozilla Thunderbird. In many cases moving to alternative software can lower your risk of being infested.

Likewise, a move to Apple or Linux can lower your exposure compared to Windows. You shouldn’t assume that those platforms will always be more secure. Ultimately the security of a platform comes down to much more as I hope this series is bringing to light.

Related Posts

Blog Traffic Exchange Related Posts
  • Urgent AOL update This sounds like a serious vulnerability. The SecurityFix is reporting on a very serious vulnerability in AOL. The problem affects AOL version 8.0, AOL version 8.0+, and AOL version 9.0 Classic. The vulnerability could allow a remote attacker to take control of a users PC. Basically, all that would be......
  • How to Remove SiteAdware | SiteAdware Removal Guide SiteAdware is a rogue antivirus application that is typically installed without the computer users express permission. It is promoted through trojans and fake video codec or flash player updates. Once established on the sysem it will tend to do a falsified scan of your pc and claim that you have......
  • Cross browser javascript vulnerability It sounds like this vulnerability would take a great deal of user interaction, but cio-today is reporting on a browser vulnerability that affects pretty much every javascript enabled browser. According to Symantec .... "This issue is triggered by utilizing JavaScript 'OnKeyDown' events to capture and duplicate keystrokes from users," and......
Blog Traffic Exchange Related Websites
  • Finding Antiques and Collectibles If you are interested in the art of antiquing, then you should know that there are antiques and collectibles that you can find in all shapes, all sizes and all kinds of locations. All of these antiques and collectibles have history, a past, a story to them. People can find......
  • Advertise Your Product On Search Engine With Our SEO Services Too much stress has been put on the efforts and privileges of running an Internet business. Presently, all sorts of users share the electronic market, and competition is very tough in all domains of activity. Click here for more info! Regardless if we are talking things at the small or......
  • How To Remove Vista Internet Security 2011 Virus You may be the latest victim of Vista Internet Security 2011. This name-changing virus has the different version, but no matter what version you have, the issues are the equivalent. The cyberpunks who formulated this virus were quite professional to make the program dynamically change its name according to windows......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site