- Sep 15, 2008
- 5,055
- 198
- 116
I wonder how FF 5.0 with No Script and AdBlock would fair
From the Article said:The study only looked at sites that depended on tricking users into installing malicious software; anything that used browser flaws to run wasn't included in the test.
Except that the SmartScreen filter doesn't test the user...it simply blocks bad URLs. AppRep is the "are you sure you really, really wanna do this" backup.It probably wouldn't have made too much difference, since they were testing the user, not really the browser.
Except that there weren't any foolish user commands other than "yes, I really, really wanna do this", which you can do with every browser. Also, MS has literally zero control on whether or not socially engineered exploits can or cannot run from other browsers...install those webkit browsers on a Mac, and the results will likely be the same.The only reason IE9 did better than the others, is because Microsoft wouldn't accept foolish user commands when run through their own browser. Microsoft will allow the socially engineered exploits to run from other browsers, but not theirs.
No, the results we saw back in December were an advertisement. These results were from an independent lab.It's more of an advertisement than a test, in my view.
You do realize that IE has been integrated with the OS shell since OSR2 was released, right? The shell experience is enhanced by IE, not the other way around. And according to how I read the wording of the article, you are significantly more vulnerable using a non-integrated browser...much more.Microsoft found a nitch their browser is better at because it is integrated into the OS- ie protecting from ignorant users. Implied, but not stated in the article, is the inherent danger of an integrated browser. The danger is that, if an exploit can get a foothold through IE, it is better equipped to do substantially more damage than it would be possible through an unintegrated browser.
The study only looked at sites that depended on tricking users into installing malicious software; anything that used browser flaws to run wasn't included in the test.
It's hard to beat zero-day exploits when most people go with the default settings for Automatic Update. The biggest security flaw has been, and always will be, behind the keyboard. As a result, the most common way to infect somebody's machine is to trick them into giving you permission to do it.isn't this the biggest reason to not use Internet Explorer and instead use a different browser?
The study only looked at sites that depended on tricking users into installing malicious software; anything that used browser flaws to run wasn't included in the test.
As I alluded to earlier (and will now include a link), the results released in December were a MS-funded study (http://www.computerworld.com/s/arti...Rep_bumps_browser_s_anti_malware_score_to_99_), while this came from an independent lab.Test looks like a lop-sided microsoft promotion.
That will primarily impact only the people who turn off Automatic Update, so a browser exploit is what most people are not going to be running into.Lets see a test that used browser exploits, because that is what people are going to be running into.
And thus the beauty of SmartScreen...if the attack page is known, it's completely blocked. If the attack page is not known, IE9 should stand up to it just as well as your favorite third-party browser...possibly better, since SmartScreen can analyze webpages and determine if they have any characteristics that might be suspicious and then warn the PEBKAC that the site may be unsafe.When someone lands on an attack page, let see how well ie 9 stands up then.
You're BS (see also, http://forums.anandtech.com/showthread.php?t=2168158).thats BS. Check the versions that was used and what malware samples were used? No one use firefox just plain. It got add ons for a reason
You're BS (see also, http://forums.anandtech.com/showthread.php?t=2168158).
Versions used were (at the time of testing) current releases, they were even listed. No one you know uses firefox just plain...tens of millions of others do. And firefox has dozens of reason for having add-on capabilities...enhancing security is only one of them.
And pulling the add-on argument after pulling the version argument is a crutch.
Everyone knows malware use exploits. Thats why we update things. So version is one of the most important things doing such tests cause all you do is use old exploits on the older versions when the newer versions are patched up. Will it be fare to test a outdated av with a dated one and say the version number is not a excuse? They used the latest version of IE but older versions of FF and Chrome. Chrome 10??????????????????????? Chrome is at 14 already. So nice try try againInternet Explorer 9 blocked 92 percent of malware with its URL-based filtering, and 100 percent with Application-based filtering enabled. Internet Explorer 8, in second place, blocked 90 percent of malware. Tied for third place were Safari 5, Chrome 10, and Firefox 4, each blocking just 13 percent. Bringing up the rear was Opera 11, blocking just 5 percent of malware.
If you're not going to read it yourself, you don't get the privilege to call BS.Please tell me what versions were used? Again its BS
Stop listening to your imaginary friends. They're stupid.Everyone knows malware use exploits.
If you're not going to read it yourself, you don't get the privilege to call BS.
And I sure as hell ain't gonna waste time holding your limp hand thru it.Stop listening to your imaginary friends. They're stupid.
I might as well be...I sure as hell ain't gonna talk to you again.Talking to yourself again?