[Owasp-brazilian] Browser Virtualization - Endpoint Security

Lucas Ferreira sapao at sapao.net
Wed May 14 21:54:39 EDT 2008


Então não entendi a sua crítica. o que você quis dizer com "O problema
como sempre é a compatibilidade com sites e aplicações - não adianta
nada infelizmente o seu browser ser super-seguro se ele não roda
Flash."?

Me parece que a arquitetura deles pode ser perfeitamente compatível.
Inclusive, já que a Microsoft patrocinou a pesquisa, quem sabe o IE
não incorpora essa arquitetura no futuro?

Inté,

Lucas

On Wed, May 14, 2008 at 10:27 PM, Fernando Cima <fcima at microsoft.com> wrote:
> Eu sei, exatamente por isso o paper é interessante.
>
> Abraços,
>
> - Fernando Cima
>
> -----Original Message-----
> From: lucas.ferreira at gmail.com [mailto:lucas.ferreira at gmail.com] On Behalf Of Lucas Ferreira
> Sent: Wednesday, May 14, 2008 6:36 PM
> To: Fernando Cima
> Cc: Marcos Aurelio Rodrigues; owasp-brazilian at lists.owasp.org
> Subject: Re: [Owasp-brazilian] Browser Virtualization - Endpoint Security
>
> Pelo que entendi, a arquitetura deles prevê plugins, ou seja, poderia
> perfeitamente rodar o flash.
>
> Lucas
>
> On Wed, May 14, 2008 at 3:07 PM, Fernando Cima <fcima at microsoft.com> wrote:
>> Voce pode ver o paper que ele está comentando em http://www.cs.uiuc.edu/homes/kingst/Research_files/grier08.pdf. O problema como sempre é a compatibilidade com sites e aplicações - não adianta nada infelizmente o seu browser ser super-seguro se ele não roda Flash.
>>
>> Abraços,
>>
>> - Fernando Cima
>>
>> -----Original Message-----
>> From: owasp-brazilian-bounces at lists.owasp.org [mailto:owasp-brazilian-bounces at lists.owasp.org] On Behalf Of Lucas Ferreira
>> Sent: Wednesday, May 14, 2008 1:00 PM
>> To: Marcos Aurelio Rodrigues
>> Cc: owasp-brazilian at lists.owasp.org
>> Subject: Re: [Owasp-brazilian] Browser Virtualization - Endpoint Security
>>
>> Na linha de "safe browsing", achei interessante o seguinte comentário:
>>
>> http://feeds.feedburner.com/~r/CeriasCombinedFeed/~3/288926130/
>>
>> Inté,
>>
>> Lucas
>>
>> On Wed, May 14, 2008 at 9:04 AM, Marcos Aurelio Rodrigues
>> <deigratia33 at gmail.com> wrote:
>>>
>>> ForceField is Check Point's implementation of the browser virtualization
>>> concept, in which all of the operating system elements that interface with
>>> the browser -- including the registry -- are duplicated during a Web
>>> session. If malware or some other infection is introduced, they interact
>>> only with the duplicate, leaving the core operating system unharmed.
>>>
>>> "It's sort of like a stunt double that you see in the movies," says Laura
>>> Yecies, vice president and general manager of Check Point's ZoneAlarm
>>> consumer division. "The duplicate takes all the risks, and your most
>>> valuable assets stay safe."
>>>
>>> While users are in the "sandbox," ForceField also protects them with a range
>>> of security tools, including anti-phishing tools, spyware site blocking,
>>> site ratings, download scanning, keylogger jamming, temporary file
>>> encryption, and a "private browser" mode that prevents others from viewing a
>>> user's online activities.
>>>
>>> Integra...
>>>
>>> http://www.darkreading.com/document.asp?doc_id=153775
>>>
>>> --
>>> ========================================
>>> Marcos Aurelio Rodrigues (DEiGrAtiA-33)
>>> <deigratia33 at gmail.com>
>>> CCNA, MCSO, Security+
>>> Mirabilia laudo semprer, Dei
>>> ========================================
>>> _______________________________________________
>>> Owasp-brazilian mailing list
>>> Owasp-brazilian at lists.owasp.org
>>> https://lists.owasp.org/mailman/listinfo/owasp-brazilian
>>>
>>>
>> _______________________________________________
>> Owasp-brazilian mailing list
>> Owasp-brazilian at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-brazilian
>>
>


More information about the Owasp-brazilian mailing list