skip to main
|
skip to sidebar
Security Monkey
Search
Home
About
Subscribe
Contact
Log In
Thursday, October 7, 2010
Adobe Flash configuration
Found an article on Adobe Flash configuration and the implications of it.
http://blog.eset.com/2010/10/06/adobe-flash-the-spy-in-your-computer-%E2%80%93-part-2
It references a
pdf
that gives the full spec but the article covers off a few interesting things that perhaps should be considered for flash/internet facing systems.
0 comments:
Post a Comment
Newer Post
Older Post
Home
Search This Blog
Blog Archive
►
2012
(2)
►
February
(1)
►
January
(1)
►
2011
(11)
►
June
(2)
►
April
(4)
►
February
(1)
►
January
(4)
▼
2010
(79)
►
December
(4)
►
November
(2)
▼
October
(11)
Java outstrips Adobe
Increase in 'Cyber Security' Budget
Tenable Nessus YouTube Channel
Nessus XML parsing with Awk
Sophos articles on malicious code
Team Logo
determining and Mounting LUKS based encrypted disk...
Adobe Flash configuration
Geo locating an IP address
Article on setting effective consumer IT security ...
How To – Digital Forensic Imaging In VMware ESXi
►
September
(9)
►
August
(1)
►
June
(2)
►
May
(6)
►
April
(11)
►
March
(7)
►
February
(19)
►
January
(7)
►
2009
(62)
►
December
(2)
►
November
(4)
►
October
(7)
►
September
(6)
►
August
(2)
►
July
(6)
►
June
(3)
►
May
(11)
►
April
(4)
►
March
(2)
►
February
(8)
►
January
(7)
►
2008
(99)
►
December
(23)
►
November
(5)
►
October
(2)
►
September
(8)
►
August
(9)
►
July
(4)
►
June
(17)
►
May
(25)
►
March
(6)
Labels
dns_monitoring
(1)
education
(2)
firewall
(1)
forensic
(6)
geo location
(1)
howto
(1)
incident response
(8)
internet
(3)
IP
(1)
iptables
(1)
joke
(1)
linux
(1)
netwitness
(1)
network
(2)
passwords
(1)
privacy
(2)
procedure
(3)
process
(3)
router
(1)
safety
(4)
security
(4)
standards
(3)
timeline
(2)
usb
(1)
vulnerability
(2)
Powered by
Blogger
.
0 comments:
Post a Comment