unSpawn |
08-05-2012 06:24 AM |
Quote:
Originally Posted by jefro
(Post 4746173)
I view the subject of ad's or unwanted content on a web page the same way I view OS/application security. I say my OS will be subject to an attack at some point no matter what I do. I can only limit my exposure. If you feel you have found some way to block content then there will be some new means to send junk to your browser. The worse offenders rely on new found holes in security. The really bad ones might get past any controls, because they know someone is trying to prevent them.
|
Sure, but there's a difference between just "believing" ("I think", "don't worry", "I guess") something is secure and proper hardening and regularly auditing exposure. And since you're linking this to security maybe you can understand that relying on /etc/hosts is just like valuing Psionic PortSentry over Snort. PS is everything Snort is not: of limited use, inefficient, prone to FP's, obsolete, no longer maintained, etc, etc. But just like there's still people stubbornly advertising /etc/hosts as an efficient and accurate method of blocking ads there's still people stubbornly installing PortSentry, even in 2012. Part of that may be due to people not realizing that some HOWTO's on the 'net are utterly deprecated and part of that may be due to, what shall we call it generally speaking, some form of perverse ignorance?
I just can not understand why, with all that we can use these days, people still maintain blocking IP addresses is "good enough" when every simple test shows it just is not...
|