Firefox is a good browser but not the panacea its most ardent fans think it is. While Microsoft's IE gets most of the attention for its security vulnerabilities, the reality is that Firefox (like other open-source products) has security flaws of its own of that readers need to be aware of, Fred Langa notes.
For an industry built on logic--at their deepest level, computers are logic circuits--blatant illogic somehow manages to cloud many issues.
Take Firefox, for example, a very nice browser from Mozilla.org. It's free, open source, and the result of literally years of development. It's also a cross-platform application, available for Windows, Mac, and Linux--a huge plus in computationally diverse environments because the configuration and training/learning curve is basically the same, no matter what platform the browser's installed on. Its human language support also is extensive, with versions in everything from Afrikaans to Welsh. No question: It's impressive software.
Some also like it simply because it's not from Microsoft. I think this approach has some merit: Whenever Microsoft loses serious competition in any software category, it grows complacent, and the pace of innovation slackens. IE6, for example, came out in 2001; an eternity ago, in computing terms. Except for a boatload of security updates and patches, it's still basically the same browser it was then.
And those security issues aren't trivial: All browsers, by design, open a two-way channel to the servers they connect to; browsers that contain security flaws therefore expose their host PCs--and their owners--to the potential of malicious attack by exploitation of the security flaws. Microsoft's software has exposed more users to more potential and real attacks than any other software.
Microsoft's problems with online security stretch back to the early days of Windows, when networking was somewhat of a black art. Much of Windows' internal development in Windows 3.1 and 3.11 was to make Windows network-aware and largely self-configuring. The Windows developers mostly succeeded, and Windows became easy to network, with few obstacles to interconnection in the "friendly" confines of LANs, where other PCs and their users could be regarded as non-hostile.
But the explosion of interest in the Web took Microsoft by surprise, and the company rapidly integrated a browser into Windows, producing an operating system version called "Windows 95 Microsoft Internet Explorer." This, in essence, exposed an easy-to-connect-to operating system to the online world at large; a fact almost immediately exploited by crackers and other cybermiscreants. Microsoft has been busily backfilling security holes ever since; even in later versions of Windows, in which the company should have known better and taken more aggressive steps to lock down the core operating system.
While Microsoft, with a 95% market share, struggled to patch the myriad security holes in all its operating systems, the Mac and open-source products such as Linux gained a reputation for being more secure. In fact, that's one of the main reasons cited now for people switching to Firefox--that it's more secure than Internet Explorer. It's a very appealing concept, and has become part of computing's conventional wisdom: Non-Microsoft = More Secure.
Trouble is, that's a falsehood based on a common error: Failure to adjust for the effects of the installed base.
[Interop ITX 2017] State Of DevOps ReportThe DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.