Host exploit- Test your security

Discussion in 'other security issues & news' started by Dark Shadow, May 16, 2012.

Thread Status:
Not open for further replies.
  1. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
  2. moontan

    moontan Registered Member

    Joined:
    Sep 11, 2010
    Posts:
    3,931
    Location:
    Québec
    tnx for the link.

    most of these tests did not even have a chance with NoScript at default deny.:)
     
  3. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    The test complained me not having IE6/IE7 or Firefox :argh: :argh: :argh:

    so my non existing noscript on my non existing firefox did not have a problem at all and did as well as my non existing ie6/ie7
     
  4. moontan

    moontan Registered Member

    Joined:
    Sep 11, 2010
    Posts:
    3,931
    Location:
    Québec
    hahaha! :D

    i've noticed that.lol
     
  5. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    :thumb:
     
  6. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Cool:D
     
  7. jitte

    jitte Registered Member

    Joined:
    May 2, 2012
    Posts:
    67
    I thought their listing of the hackingexposed.com site as a "High-Risk Site" was a bit of a stretch to say the least. It's forum (all 4 threads of it), McAfee Communities, is hosted at community.mcafee.com, the same company that puts out McAfee AV, and they clearly identify themselves as being associated with it on the site home page banner. From the site:

    While it was my first visit to the site, I do own the First Edition of Hacking Exposed. It tells about a number of different exploits in a effort to educate the reader, to enable them to defend themselves through better understanding of how the attack is carried out, then gives advise on how to defend against each attack. Which is sound reasoning IMO, as opposed to the obsessive piling on of one security program after another as a type of "security blanket" Linus might use if he was computer literate.

    I believe they would be better served to find an actual high risk site to use in their tests. One of the shortwave radio stations in Asia Firefox blocked that I recently stumbled on would do as well, because if they're going by name only, their domain of hostexploit.com sounds just as, if not more, threatening to me.
     
    Last edited: May 16, 2012
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.