Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Firefox's 'retreat' ensures Microsoft excels
Contractor UK ^ | Aug 22, 2005 | Contractor UK

Posted on 08/26/2005 6:31:03 PM PDT by Bush2000

Firefox's 'retreat' ensures Microsoft excels

Open source web browser Firefox has lost the momentum it has steadily gained since it was unleashed last year, according to Web analysts at Net Applications.

The online portal’s unique Hit List service reveals a slump in the Mozilla browser’s market share, falling from 8.7% to 8.1 % in July.

Coinciding with its demise, was the advance of Microsoft's IE that has gained some of the ground surrendered in June, climbing back from 86.6 % to 87.2% last month.


The revival for the dominant browser comes on the back of average monthly losses of between .5 to 1% for Redmond, as Firefox started to gain acceptance among a wider audience than just tech-savvy users.

When asked by Contractor UK whether Microsoft’s sudden gains were from the unveiling of a new IE, Net Applications said a re-launch tends revive industry interest, and could have bolstered Microsoft’s market share of the browser market.

When a company launches a new product, there is always renewed interest in what the company has produced and it would also be fair to say that this may have had an effect, said a member of the Hit List team.

Although, there have been browser issues with Windows 2000 in the news, so it is possible that again you may see a dip [in Microsoft’s market share]. Right now, people are looking for security and whenever there are issues with the security of one's system, they will use what they feel will be the most secure.”

Besides Net Applications, web developer site W3 Schools, confirms that adoption of Firefox is falling, just as IE is reaching its highest share of the market in 2005.

According to W3's data on specialist users, Microsoft IE (6) enjoyed a 67.9% share in July, improving to 68.1% in August matched against Firefox’s top share of 21% in May, which has now dropped to 19.8% for the last two months.

Observers noted that both sets of analysis concur that Microsoft’s loss, up until now, has been Firefox’s gain, but over the last month roles have reversed.

Security fears concerning Mozilla and its browser product have recently emerged, coinciding with Microsoft’s high-profile trumpeting of its new safer browser product (IE 7), complete with glossy logo.

Experts at Net Applications said they were surprised at Firefox’s sudden retreat, saying they expected a slow down before any decline.

Yet they told CUK: “Whenever there may be problems with security, there always is a decline with users changing browsers.”

Data from the Web analytics company is based on 40,000 users, gleaned from their global internet operations, prompting some commentators to question the so-called ‘global decline’ in the Firefox market share.

The Counter.com reportedly finds that between June and July, Firefox actually increased its share by two points, and overtook IE5 for the first time ever.

The Web Standard Project suggests webmasters should treat data from web analysis providers with caution, before rushing to make service changes.

So what can we conclude?” asks the WSP, a grass roots project fighting for open access to web technologies.

“Not much: Mozilla-based browsers are probably used by just under 10% of the web audience and their share is growing slowly. IE5.x is probably used by somewhat less than that and its share is declining slowly. IE6 is roughly holding steady.”

Meanwhile, Spread Firefox, which measures actual download rates of the browser, reports that it took just one month for the Mozilla Foundation’s showpiece to reach 80 million downloads in August – from its July total of 70 million.

At the time of writing, Firefox had been downloaded 80701444 times, meaning adoption rates of over 10m occurred one month after Net Applications says Firefox bolted in light of the dominant IE.


TOPICS: Computers/Internet
KEYWORDS: canthandlethetruth; firefox; forqclinton; fud; gatesbot; gatesfanclub; gatesgroupies; geisforqclinton; ie; microsoft; msfanboys; paidshill; redmondpayroll; shillboy2000; spyware; trojans; valentilapdog; viruses; worms
Navigation: use the links below to view more comments.
first previous 1-20 ... 401-420421-440441-460 ... 601-619 next last
To: ShadowAce
Rainbow would just produce a password based on a 12 char policy and it wouldn't work.

Maybe Linux is doing a different type of salting then I'm familiar with. I thought salting was like this: SALT + Password = hash All you do is you put the salt unique id with the password (beginning, end, middle...wherevever). Then you make a hash out of it. You don't need to know the salt. as the entire salt+password is hashed. once you break the hash you now have the salt+password.

421 posted on 08/30/2005 8:08:21 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 419 | View Replies]

To: for-q-clinton
My point was to show that it is vulnerable. Not that Windows is better.

I understand. I'm also not trying to say that Linux is invulnerable (heck, with physical access, I can get into almost any Linux system inside of ten minutes). But with salting, I don't believe that Rainbow can be used to crack its passwords.

422 posted on 08/30/2005 8:08:37 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 420 | View Replies]

To: for-q-clinton

I said... There's also buffer overflows, sql injections, and input validation errors which can get you to run code on a box.

"Really? So on a fully patched box you can execute these types of attacks. Impressive indeed. So Impressive, I don't believe it."

SQL injections are most often present in web applications, though i've also found them in binary client/server apps. I've been able to do things liks steal the user/password database table for an app through the "lost password" dialog box... on a fully patched system without compromising the system. This was entirely through an input validation failure in the web app.

I've done similar things with client/server apps. While the binary client might validate user input, the server did not - it relied on the client. Using an ethernet sniffer like tcpdump or ethereal to understand the application protocol in use and a command line tool like ngrep, i could intercept and modify the client/server communications stream, inserting stuff that the client would not normally allow you to do. This bypasses client side input validation, and lets you submit arbitrary strings to the server. Again, input validation issues that might include things like remote command execution or sql injection.

The level of privilige you have for sql injection is dependent on the user context that the query runs as. You'd be surprised how often web apps in internal environments use the SA account out of laziness.

"Explain to me one buffer overlow you can exploit on a fully patched box? If you can't my bet is GE was right about you."

OOOOOOh. If he was, it would be the first technical thing he was ever right about.

Buffer overflows on a fully patched box? That would be the exploit that the vendor doesn't know about, or one that they haven't patched.

Even in environments with "fully patched boxes," it's hard to keep everything up to date. One time I did a pentest and every box was patched... except for a kiosk in the lobby that had been plugged in for patches months ago, never unplugged, and was not part of the normal patching routine. They just didn't know it was still plugged in. It was a somain member, I compromised it, and used it to take over the rest of the domain.

Right now I'm doing an assessment for a fortune 100 company. They have excellent patching procedures, strong policies, strong controls.... and still, there's always a way in, because their network is so big. They have to be perfect every time... I have to get it right once.


423 posted on 08/30/2005 8:12:11 AM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 400 | View Replies]

To: for-q-clinton
You don't need to know the salt. as the entire salt+password is hashed. once you break the hash you now have the salt+password.

My understanding of Rainbow is that it uses the entire string as the password. It assumes there is no salt. It will then find a string that hashes into the hash it is given. It will then return this as a password. The key to this is that it assumes no salt is given. Also, you, as a breaker, would not know how long the salt string is. Rainbow is producing a password based on a 12-char password, rather than a 4-cahr salt+8-char password. It doesn't know to look at only the portion of the given hash to produce a portion of a password.

424 posted on 08/30/2005 8:14:18 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 421 | View Replies]

To: adam_az
OOOOOOh. If he was, it would be the first technical thing he was ever right about.

Aren't you the same guy that hit the abuse button for GE calling you an idiot and twisting what you say? And you say that would be the first thing he was right about.

You're very immature and need to learn not to where your feelings on your sleeves. How does putting GE down and saying something false like that make you feel good about yourself?

425 posted on 08/30/2005 8:17:50 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 423 | View Replies]

To: for-q-clinton
however, it doesn't do one thing to stop something like Rainbow Crack from brute force attacking their hash.

It adds an extra dimension of difficulty in cracking the hash. If all the salts on a system were the same, then a general lookup table would just have to be that much bigger. Probably still possible with a really big hard drive.

But each salt for each user is usually different, so now you have to up your table size exponentially yet again (2.8*10^14 times each hash entry already there), and your storage requirement is probably into the petabyte range or beyond. Basically, now Rainbow Crack would be trying to crack a 22-character password.

Salts don't protect against brute-force calculation attacks (as opposed to lookup attacks) where the cracker has the password file. In that case he knows the salt and can concentrate computer time on cracking a specific password. But that still takes a while.

426 posted on 08/30/2005 8:18:19 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 410 | View Replies]

To: adam_az
Why waste your time trying various clients? Why not just take the server's hard drive out and get the hashes and then attack them with Rainbow Crack?

Or just listen to the wire and get the hash and then crack? According to antiRepublicrat it's nearly fool proof. Also since you get paid for this, you can charge the $500 for the hash table to the client.

427 posted on 08/30/2005 8:20:27 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 423 | View Replies]

To: ShadowAce

I prefer John the Ripper. Used to use crack, but I gave it up. ;)

It's a classic dictionary brute force.

You encrypt the dictionary one word at a time, and compare the hashes. The chance of collision is so small that when you match hashes, you can be sure you've found your password.

Rainbow supports a precomputed has database, which can speed this up immensely... no need to re-encrypt on the fly, you just compare to the DB.

Windows hashes of short passwords (6 chars or less) are especially vulnerable, because the LM Hash is stored in 2 pieces of 8 bytes each (pretty sure it's 8, not worth looking up for the point of this convo). If you use a short password, someone only has to crack half as many bytes. (A 7 byte password is strong, because there are 2 bytes of padding added, making the total stored length 9 bytes.)

Oops!


428 posted on 08/30/2005 8:21:29 AM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 419 | View Replies]

To: for-q-clinton
Score: Me 1 you 1/2 (since it was a parsing of the words).

Where's your 1? Your virus wasn't a virus, and not even in the wild. It was just a possible exploit that could not travel beyond the LAN even if it could replicate itself to other computers (and what would be the point, you're already capturing all the updates on that LAN).

429 posted on 08/30/2005 8:21:58 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 412 | View Replies]

To: N3WBI3
I'll make this easy for you. The portion of the article that you excerpted doesn't help your case; in fact, the article points out that MS is reporting vulnerabilities in exactly the same fashion as open source vendors... As for Zymaris's argument that Gentoo is more "20 times more secure" than Windows, that's a good spin on bad news but it's pure rubbish. First, Zymaris is a shill for the open source industry; quoting him is like quoting Gates or Ballmer about Microsoft. Second, when you add up the vulnerabilities that affect any Linux distribution, the fact remains that the number dwarfs Windows. If you install more open source code, you're going to experience more vulnerabilities. Third, it's specious to conclude that vulnerabilities don't exist in code that isn't being installed or examined frequently. You should know this by now. We just saw a vulnerability reported in ELM the other day. WTF uses ELM?!? It's been available for 20 years, and yet somehow, this flaw is only being detected now. The "more eyes make more secure code" argument is a fraud.
430 posted on 08/30/2005 8:24:11 AM PDT by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 385 | View Replies]

To: antiRepublicrat
Interesting. And what does Linux do to prevent a brute force attack?

It salts the hash; therefore, Rainbow Crack won't work on it.

But this is what you said. And it was in a discussion around windows with strong passwords. As I said salting does make the password stronger, but so does increasing the password length. So saying windows is more at risk is bogus. Salting allows admins and users to be lazy with passwords because it makes them stronger without user intervention.

My review of Rainbow Crack looks like it's a brute force method to crack. Not a dictionary attack; therefore, Linux hash is at as much risk as a Windows hash.

431 posted on 08/30/2005 8:25:34 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 426 | View Replies]

To: for-q-clinton

"Aren't you the same guy that hit the abuse button for GE calling you an idiot and twisting what you say? And you say that would be the first thing he was right about."

Thats not an insult, it's an observation.

GE has a long history of making incorrect technical statements. That's what I was referring to.


432 posted on 08/30/2005 8:26:33 AM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 425 | View Replies]

To: for-q-clinton

Besides, I took that challenge as stated in that post, no parsing of words, you did not state the challenge was conditioned on the content of previous posts. I also did not commit myself to an undefined challenge of yours, only attemted to define one before anyone should take it.

So I'll give you 0, me 1/2. I'll be nice and still give up half since you did not correctly state the challenge you intended to give. Although I won a challenge as clearly written, I did not win one as intended, so it is a somewhat shallow victory.


433 posted on 08/30/2005 8:28:02 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 412 | View Replies]

To: adam_az
The chance of collision is so small that when you match hashes, you can be sure you've found your password

Actually a collision is also a match. It doesn't matter what the password is just that the hash needs to match. So if you hit a collision you in essence have a working password.

434 posted on 08/30/2005 8:28:09 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 428 | View Replies]

To: antiRepublicrat

My 1 is that you can't point to on buffer overflow today that can be exploited remotely on a fully patched windows box.


435 posted on 08/30/2005 8:28:58 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 429 | View Replies]

To: for-q-clinton

"Why waste your time trying various clients? Why not just take the server's hard drive out and get the hashes and then attack them with Rainbow Crack?"

It's in the context of doing an enterprise security assessment, which also takes policies and procedures into account, or in the context of a pentest, which is to get an idea of the networks security posture at a point in time, compare against their standards and best practice to find the gap, and give them a roadmap to fix the delta.

"Or just listen to the wire and get the hash and then crack?"

Done that. Most networks are switched which can make it a little more difficult, but not impossible using various ARP spoofing techniques.

"According to antiRepublicrat it's nearly fool proof. Also since you get paid for this, you can charge the $500 for the hash table to the client."

Rainbow is pretty fool proof.

Other thing that makes Windows LM passwords easy to crack is that you only have to crack half the password at a time, since it's stored as 2 discrete 8 byte hashes...


436 posted on 08/30/2005 8:30:55 AM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 427 | View Replies]

To: antiRepublicrat
You're such a joke. If that makes you feel like Windows is more at risk because I didn't clearly spell out the challenge.

Actually I'm taking back the 1/2 point because I clearly did discuss physical security on the box. And you never asked for full details of the challenge. So you lose having accepted the challenge (even though you didn't know the full scope) and you can't provide a buffer overflow that can be exploited remotely.

437 posted on 08/30/2005 8:31:24 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 433 | View Replies]

To: for-q-clinton

"Actually a collision is also a match. It doesn't matter what the password is just that the hash needs to match. So if you hit a collision you in essence have a working password."

True, but the chance of finding a collision where the password is NOT the actual cleartext password is miniscule. It's even smaller if you limit the number of non-matching collisions to dictionary words and variations.


438 posted on 08/30/2005 8:32:52 AM PDT by adam_az (It's the border, stupid!)
[ Post Reply | Private Reply | To 434 | View Replies]

To: antiRepublicrat
Not all, just a good chunk for the initial, and being there at the right time.

Put down the crack pipe. You can't even admit that OS licensing was a brilliant move, as opposed to a stroke of "luck". You're hopeless.

If you want to call that competition, go right ahead. It was only a sad attempt to copy Apple. Really sad. I tried it. DOS was better. Come to think of it, DOS was better than Windows 286 too.

Hahahah. Look, pal. A few posts back, you argued that Microsoft wasn't competing against IBM. I just pointed out that, in fact, Windows came out before OS/2. Whether or not it was better than Apple is irrelevant. So, you lose. Game over. Thank you for playing...

What was luck was IBM not demanding an exclusive license, as what IBM wanted back then, IBM got.

Yeah, it must have slipped right by those poor dumb IBM attorneys. LMFAO! Are you seriously deluded enough to think that IBM didn't know what was going on? You're insane! Bottom line: IBM needed an operating system. It didn't have time to write one of its own. That's why it went to Gates. He had IBM over a barrel, and he charged them dearly for DOS. You seem to think that the attorneys didn't realize that this was a non-exclusive agreement. What do you smoke? Colombian? Maui Wowie? Seriously, I've gotta know...

Then why not do it for Vista?

Virtual PC is available as a separate SKU on Windows. It doesn't have to be incorporated.

You might be surprised to know that the OS I use the majority of the time is W2K3.

Which is a damned fine operating system. Even you have to admit that.

Since almost nobody is using Linux on the desktop, the recent surge in Apple desktop sales had to be going against something -- Windows.

Surge? Is that what it is? LMAO! Wake me up when they crack 5%.
439 posted on 08/30/2005 8:33:41 AM PDT by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 391 | View Replies]

To: Bush2000
The "more eyes make more secure code" argument is a fraud.

I always thought it was the more eyes on the code allows the black hats to exploit your system.

440 posted on 08/30/2005 8:34:52 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 430 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 401-420421-440441-460 ... 601-619 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson