Recently a few ActiveX exploits came out (and lots in the past) where the exploit could be mitigated by setting the "killbit" in your registry in Windows. We've talked about it alot at the Internet Storm Center, the ability to possibly mitigate potential client side exploits by not allowed IE to process ActiveX controls.
There is alot of confusion about what this means on behalf of the user. Well the (MSFT) Technet bloggers have put out a 3 part series about what this means. It's worth a read. Take a look here.
Or, don't use IE. Probably safer that way. I have an operating system I can suggest you switch to!
;)
4 comments:
I hope a ton of people switch to apple too: then there'll be enough of a userbase to bother writing exploits for, and the snide "oh, if you only used apple" comments would dry up.
Including mine. Well, maybe not.
I hope a ton of people switch to apple too: then there'll be enough of a userbase to bother writing exploits for, and the snide "oh, if you only used apple" comments would dry up.
Including mine. Well, maybe not.
Post a Comment