Skip to Content
9-20-2010 @ 2:57PM
Sparks, you seem to know a bit about this, so let me ask, to what extents is the behind-the-curve period of vulnerability still risky for someone who uses No-Script and the highest level of other browser security settings (let's assume for convenience I don't fall for social engineering)? It seems to me that the No-Script approach would still offer a level of protection against unknown threats, as it simply won't let anything run that you don't allow (assume also I don't allow anything at all). While I understand that the very second I allow something, even something safe like a youtube video, I expose myself to risk. In theory though, if I never did allow anything, wouldn't at that point a compromised wow account be almost impossible from the mechanisms you described?I ask because I don't know, but if the conjecture were true (or even just had a big increase in security), then it does hold that those who get hacked are partially responsible.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.