In the early days, when Web pages were just static HTML files, they did not contain executable code. Now, they often contain small programs, including Java applets, ActiveX controls, and JavaScripts. Downloading and executing such mobile code is obviously a massive security risk. For few days from now on, I'll be talking more on Applets, ActiveX controls, and JavaScripts. So, please bear me.
Java applets small Java programs compiled to a stack-oriented machine language called JVM (Java Virtual Machine). They can be placed on a Web page for downloading along with the page. After the page is loaded, the applets are inserted into a JVM interpreter inside the browser.
When an applet tries to use a system resource, its call is passed to a security monitor for approval. The monitor examines the call in light of the local security policy and then makes a decision to allow or reject it. In this way, it is possible to give applets access to some resources but not all. Unfortunately, the reality is that the security model works badly and that bugs in it crop up all the time.
Tuesday, June 5, 2007
Web pages itself are more dangerous than viruses
Posted by
Unknown
at
8:00 PM
Labels: Programming, Security, Virus/Antivirus
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment