D
Zepos said:Lovely lightblue screen, but what else am I suppose to see?
Zepos
Number said:Ditch the client-side code. Most of your visitors don't even know you, and
have no reason to trust you to run unquarantined/unscanned code on their
computers.
If you want to do something interesting, use SSI, CSS, HTML 4.01
Strict DTD, and if all else fails there are always server-side CGI scripts -
then it does not matter if your visitor puts you on the Restricted Sites
list, the page still displays as intended.
For example, take the web-menus and fixed branding at:
www.fieldcraft.biz
Never mind the atrocious green colour scheme. It works as intended in Gecko,
Opera, & IE - and runs no client side code as seen in other menu systems -
and because it all runs in the basis of overlapping formats, it loads and
functions faster than anything you could hack out with JavaScript or .NET -
All this and it validates as well, so one can reasonably hope (but not
reasonably assume) that future user agents won't deviate so far as to effect
the look and feel of the page display.
Are you selling something?
Something the marketing meat-heads who think that
well-formed XHTML vs conformable HTML makes a scrap of difference to the
visitor don't understand; is that the people who spend money online are
those who know the security ropes - and who don't allow web-sites to run the
sort of code that could just as easily install spyware to go fishing for
bank account numbers and passwords. The luddites won't spend a dime because
they are too lazy to learn anything more than the high cost of foolishness.
If you want the online spenders to buy from you,
let the established, known,
trusted third-party merchant provider run the client-side code and you
concentrate on making the website equally accessibly to those who do not
take unnecessary risks while browsing.
Most importantly, forget impressing
the luddites who want to be dazzled by Hollywood because that ain't where
the money is, unless you are making movies instead of web pages!
Just my two cents. I hope you find it useful in some way...
criticism of an almost blank light blue page too obvious to need
stating.
If it is allowed to do anything malicious it is clearly a poor
javascript implementation, and therefore the browser's fault. Most
people surf the web with js turned on these days, as far as I can
tell.
Ha I suppose you would say the same thing of any command-shell. You are
funny.
It has a few core (and working) gui features and a command box with a
manual of the system's api.
Criticism of judging an ide based on its minimalism and colour is too
obvious to need stating (except perhaps in your case)
I'm sorry if you think my software is ugly, what do you suggest?
I don't know anyone who turns off javascript by default. I'll take your
word for it they exist.
arachnid said:They do. FireFox has a number of very popular extensions to disable javascript by
default and only enable it for selected sites (look up "NoScript"). Some
people disable javascript for security reasons, others because it cuts way
down on obnoxious advertising gimmicks, flashing banner ads, popups, etc.,
and speeds up page downloads.
Maybe you misunderstood. Your link simply leads to a practically blank
webpage, which for practicality scores 1/10
Jack said:Any implementation that isn't provably correct is probably incorrect.
That includes essentially all implementations of Javascript.
Anyway, the problem with Javascript isn't that it's insecure - the
problem is that it's a general-purpose programming language.
A bug in a piece of general application software (such as a script-free
browser) is much less likely to expose an exploit than a bug in the
implementation of a GP programming language. And because Javascript
programs generally give no indication that they are about to launch, or
that they are still running, they pose an even more insidious threat
than a piece of warez or dodgy shareware that the user downloads and
runs deliberately.
Consequently malicious coders flock to Javascript exploits like flies to
shit.
Number said:At the risk of making everyone here barf in unison - I sell a product
specifically designed to make it easier for IE users to disable all
client-side code except for sites they first white-list.
www.fieldcraft.biz/software/browser-security
[SNIP]It's a pity that javascript has been implement so poorly and so people
have become afraid of it. There is nothing wrong with manipulating
client objects with script, and it can add a lot of convenience to a
web page, although I admit most people don't know how to use it and a
lot of people use it for ads.
Number said:[SNIP]It's a pity that javascript has been implement so poorly and so people
have become afraid of it. There is nothing wrong with manipulating
client objects with script, and it can add a lot of convenience to a
web page, although I admit most people don't know how to use it and a
lot of people use it for ads.
I agree with you, it is a pity that a few mess it up for the rest of us -
although I think you are perhaps too kind in your description of the sort of
implementations that have scared people off.
I think that a possible solution to the client-side problem is to set a
security standard for remote code that dictates apps written in
security-compliant languages simply canNOT:
1. Trigger apps not written in an equally security-compliant language
2. Access or overwrite any files not actually created by the app itself
3. Run in the background without obvious visual display
4. Receive any input whatsoever while they do not have the focus
5. Open any forms that are not children of the app's main MDI form
6. Access any hardware other than through the OS's API
7. Operate from raw uncompiled source.
This would fix the client-side problem as far as malicious code goes.
In reality, the lack of security compliance as applied to scripting
languages brings us back to constraining the presentation of web content to
forms that can be trusted if only because they are simply not capable of
being used for mischief. And yes, this is a shame...
Jack said:(e-mail address removed) wrote:
Anyway, the problem with Javascript isn't that it's insecure
- the problem is that it's a general-purpose programming
language.
A bug in a piece of general application software (such as a
script-free browser) is much less likely to expose an exploit
than a bug in the implementation of a GP programming language.
And because Javascript programs generally give no indication
that they are about to launch, or that they are still running,
they pose an even more insidious threat than a piece of warez
or dodgy shareware that the user downloads and runs deliberately.
Consequently malicious coders flock to Javascript exploits like
flies to shit.
Damn straight. The web browser has sneakily become the most installed
and installable application platform. All that's holding it back is
people trying to own it <cough>microsoft</cough>, but they will learn
eventually.
Number said:[SNIP]Damn straight. The web browser has sneakily become the most installed
and installable application platform. All that's holding it back is
people trying to own it <cough>microsoft</cough>, but they will learn
eventually.
I've lots to say about UA developers who ignore international mark-up
standards and in some cases go out of their way to disrupt the standard by
depriving web developer of unified code, and the user of features that do
not depend on interoperability bloat. There are more than one and I am not
naming any names. They know who they are, and interestingly, so too does
everyone-else.
Suffice it to say that successfully coding around these morons is supremely
satisfying. While I am at it, I am yet to see a compliant UA. If I float a
div and set the height, the height is ignored in spite of the fact that the
CSS specification says nothing about this exception to the rule that a div
will be of the height set - unless I've misread the specs...? So failing
this simple compliance test, we see... ...everyone. Have I misread the
spec or is everyone just copying everyone-else???
Well if that's how you judge things. It demonstrates various javascript
funtionality, the source is well commented and free, and it has a brief
manual (the first link, titled "help"). I don't know what else you were
looking for, given the title of the OP.