English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

look in THINSIA news www.thinsia.com to find out how dangerous
the internet explorer is.

2006-08-08 02:46:33 · 4 answers · asked by Anonymous in Computers & Internet Internet

4 answers

They use it because it is there.
Click. Loaded and running.

Friends install Firefox for friends.

2006-08-08 02:51:55 · answer #1 · answered by sheeple_rancher 5 · 0 0

Because Internet Explorer works better.
I have NEVER had a proplem with it, but then I know how to protect and use a computer.
Please read my list of "Firefox security flaws" after the protection software I use.

I use all of the following Free software with Windows XP SP2 and Internet Explorer with MSN toolbar and the pop-up blocker turned on and have never had a single problem with my computer sense Microsoft came out with SP2. (knock on wood.) (And be sure to keep Windows and the following software Updated)


The best Anti-virus is: AVG Anti-Virus Free Edition. (www.grisoft.com)http://www.grisoft.com/doc/289/lng/us/tpl/tpl01

The Best Spyware defense is: SpyBot Search and Destroy (http://www.safer-networking.org/en/index.html)<--English version

AND: AdAware SE (www.lavasoft.com)
AND Spyware Blaster (http://www.javacoolsoftware.info/kb/)
The best Firewall besides the one that comes with Windows is: Zone Alarm (http://www.zonelabs.com/store/content/co... or just (www.zonelabs.com) and select the FREE version.

These are all FREE and are all that are required. There is no reason to pay for this kind of software, except to give a donation to the writers if you can.
ALL the above programs are recommended and should be run on a regular basis. With some the free versions they must be run manually.

The best way to avoid getting any Malware (virus, Trojan's, spyware, etc) is to practice safe computing. Microsoft and many others have countless articles on the subject of safe computing. (something I think should be taught in schools)

for further information on computer safety.
NATIONAL CRIME PREVENTION COUNCIL -> http://www.ncpc.org/media/Internet_Safety.php

http://all.net/journal/50/cybercop.html
And here...
http://www.microsoft.com/athome/security/viruses/zombies_and_botnets.mspx

http://www.spywarewarrior.com/rogue_anti-spyware.htm

CNET these 10 programs comprise the best free security software
http://www.download.com/Best-free-security-and-spyware-software/1200-2023_4-5163183.html?tag=nl.e497

FIREFOX>>>>>

I thought Firefox never had any problems! LMFAO

Heres the link where this report came from.
http://isc.sans.org/diary.php?storyid=1515&rss

Security patches for Mozilla Firefox/Thunderbird/SeaMonkey
Published: 2006-07-26,
Last Updated: 2006-07-26 23:37:47 UTC by Bojan Zdrnja (Version: 1)

The Mozilla Foundation released new versions of Firefox, Thunderbird and SeaMonkey products.

New versions fix numerous security vulnerabilities, of which some are rated critical. Here's a short overview of the vulnerabilities that have been fixed:

MFSA 2006-44 (http://www.mozilla.org/security/announce/2006/mfsa2006-44.html): Code execution through deleted frame reference.
This vulnerability allows remote execution and affects only Firefox 1.5 and SeaMonkey 1.0. As Thunderbird uses the same browser engine as Firefox it is vulnerable to this as well, but the JavaScript parsing function in e-mails is not turned on by default (and we recommend that it stays turned off).

MFSA 2006-45 (http://www.mozilla.org/security/announce/2006/mfsa2006-45.html): Javascript navigator Object Vulnerability.
Another remote execution vulnerability, affects Firefox 1.5 and SeaMonkey.

MFSA 2006-46 (http://www.mozilla.org/security/announce/2006/mfsa2006-46.html): Memory corruption with simultaneous events.
Remote execution vulnerability, affects Firefox and SeaMonkey.

MFSA 2006-47 (http://www.mozilla.org/security/announce/2006/mfsa2006-47.html): Native DOM methods can be hijacked across domains.
Information leaking vulnerability, can be combined with XSS, although limited. Affects Firefox and SeaMonkey.

MFSA 2006-48 (http://www.mozilla.org/security/announce/2006/mfsa2006-48.html): JavaScript new Function race condition.
Remote execution vulnerability, affects Firefox, Thunderbird and SeaMonkey.

MFSA 2006-49 (http://www.mozilla.org/security/announce/2006/mfsa2006-49.html): Heap buffer overwrite on malformed vCard, affects Thunderbird and SeaMonkey.

MFSA 2006-50 (http://www.mozilla.org/security/announce/2006/mfsa2006-50.html): JavaScript engine vulnerabilities
Multiple vulnerabilities which can lead to remote execution, affect Firefox, Thunderbird and SeaMonkey.

MFSA 2006-51 (http://www.mozilla.org/security/announce/2006/mfsa2006-51.html): Privilege escalation using named-functions and redefined "new Object()".
Remote execution vulnerability, affects Firefox, Thunderbird, SeaMonkey.

MFSA 2006-52 (http://www.mozilla.org/security/announce/2006/mfsa2006-52.html): PAC privilege escalation using Function.prototype.call
Remote script execution vulnerability through a "poisoned" PAC file. Affects Firefox and SeaMonkey.

MFSA 2006-53 (http://www.mozilla.org/security/announce/2006/mfsa2006-53.html): UniversalBrowserRead privilege escalation.
Remote script execution vulnerability, affects Firefox, Thunderbird and SeaMonkey.

MFSA 2006-54 (http://www.mozilla.org/security/announce/2006/mfsa2006-54.html): XSS with XPCNativeWrapper(window).Function(…).
XSS vulnerability using the XPCNativeWrapper construct. Affects Firefox, Thunderbird and SeaMonkey.

MFSA 2006-55 (http://www.mozilla.org/security/announce/2006/mfsa2006-55.html): Crashes with evidence of memory corruption (rv:1.8.0.5).
Probably just a DoS attack, but there is a possibility that it could be turned into a remote execution vulnerability. Affects Firefox, Thunderbird and SeaMonkey.

MFSA 2006-56 (http://www.mozilla.org/security/announce/2006/mfsa2006-56.html): chrome: scheme loading remote content
Remote script execution vulnerability that affects Firefox and SeaMonkey.


As some of these vulnerabilities are critical, it would be good if you can upgrade as soon as possible; otherwise, check for potential workarounds in the original advisories - in most cases the vulnerabilities are JavaScript related, so turning off JavaScript will help (and that goes in general).

2006-08-08 09:55:49 · answer #2 · answered by space_man_stitch 6 · 0 0

even though firefox IS more safe when it comes against hackers, IE is more user friendly, plus most computers are loaded with IE when they are made, and most people are too ignorant to figure out how to get friefox

2006-08-08 10:00:02 · answer #3 · answered by biggibby04 2 · 0 0

Friends don't let friends drive drun.... I mean, friends don't let friends surf with web with IE.

2006-08-08 09:56:19 · answer #4 · answered by conradj213 7 · 0 0

fedest.com, questions and answers