unix and linux commands - unix shell scripting

Google Browser Security Handbook


 
Thread Tools Search this Thread
# 1  
Old 01-05-2009
Google Browser Security Handbook

The Google Browser Security Handbook is a description of various oddities in the way different browsers handle different code and other Web-related entities.  These differences can possibly be exploited in security attacks.  Internet Explorer (a few versions), Firefox (a few versions), Safari, Opera, Chrome, and Android are examined.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies

2. Debian

The Debian Administrator's Handbook

Hi, would like to share a complete reference about Debian GNU/Linux. TBH, i've never seen a complete reference book like this one here ... http://debian-handbook.info/files/2012/04/front-cover-232x300.png You can get the book with three formats : pdf, epub, mobi. The Debian... (1 Reply)
Discussion started by: love_debian
1 Replies

3. Red Hat

Install google chrome browser in RHEL

Hi All, This is my operating system. Red Hat Enterprise Linux Server release 5.7 (Tikanga). This is a64 bit version # cat /etc/redhat-release Red Hat Enterprise Linux Server release 5.7 (Tikanga) # uname -a Linux oim11gdevlab 2.6.18-274.el5 #1 SMP Fri Jul 8 17:36:59 EDT 2011 x86_64... (2 Replies)
Discussion started by: pandu345
2 Replies
Login or Register to Ask a Question
secweb(1M)																secweb(1M)

NAME
secweb - invokes the HP-UX Auditing and Security Attributes Configuration tool SYNOPSIS
[ ] [ ] DESCRIPTION
The HP-UX Auditing and Security Attributes Configuration tool ( ) is used to configure suditing sub-system and, view and configure system- wide and per-user (Local users and NIS users) values of security attributes. It also gives information about account locks. The HP-UX Auditing and Security Attributes Configuration tool provides both Web-based and terminal user interface (for Security Attributes Configuration only). The Web-based interface is launched through the HP System Management Homepage. Superuser privileges are required to access the HP-UX Auditing and Security Attributes Configuration tool. A user who does not have supe- ruser privileges has read-only access to the System Defaults area in the HP-UX Auditing and Security Attributes Configuration tool and can- not modify or reset per-user values. The terminal user interface is invoked if any of the following conditions are true: o The command is invoked with option. o The environment variable is not set. The Web-based interface is launched if all the following conditions are true: o The command is invoked with option. o The environment variable is set. o The command is available on the system. If the Web-based interface cannot be launched, invokes the terminal user interface. Options recognizes the following options: Forces a client browser to be used in less secure ways. The option forces the client browser to be used or started, even when the X-traffic between the X-server and the Mozilla browser is not secure. Use this option only when you are sure the network traffic between the host where Mozilla is running and the host in the DISPLAY variable is secure. If cannot start the Web browser, the terminal interface is started. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. If a privileged user (root) executes the command with the option, a temporary login bypass key is generated. The bypass key enables the user to access the Web interface without having to provide login information again. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. Opens the terminal interface for setting system-wide and per-user values of security attributes regardless of the current setting of the environment variable. You can also start the HP-UX Auditing and Security Attributes Configuration tool using one of the following methods: o Invoke and select the Auditing and Security Attributes Configuration (character mode) functional area to launch the terminal user interface and the Auditing and Security Attributes Configuration (Web-based Interface) to launch the Web-based tool o Invoke the HP-UX Auditing and Security Attributes Configuration tool Web interface by typing the URL in the address bar of your browser, where hostname is the name of the server o Launch the HP-UX Systems Insight Manager on the server and select the Auditing and Security Attributes Configuration tool from Configure -> HP-UX Configuration menu Online Help After the HP-UX Auditing and Security Attributes Configuration tool is started, the online help provides details on how to use the tool. RETURN VALUES
Upon completion, secweb returns one of the following values: o 0 Successful o 1 An error occurred WARNINGS
o For increased security, paste the URL in your browser, click on the Tools menu in the menu bar, then the Auditing and Security Attributes Configuration functional area. o The default minimum values of the security attributes , , , and does not meet the requirements for passwd(1M) command. A password must contain at least two letters and at least one numeric or special character. It is recommended to change the default values in for the above mentioned security attributes as per passwd(1M) requirements. For more information on password construction requirements, refer passwd(1M). AUTHOR
was developed by Hewlett-Packard Company. SEE ALSO
sam(1M), security(4), userdb(4) secweb(1M)