Go "Back" At Your Own Risk (4/19/02)
SceneLink
 

Okay, help us clear up a little confusion, here... Bill Gates really did issue a companywide memo urging all Microsoft employees to usher in a new era of "trustworthy" computing by putting security ahead of new features, right? And he even ordered the company to cease development for a month to find and squash bugs-- that wasn't just some wacky fever-dream on our part? Because it certainly seems to us that the Microsoft security holes are still coming fast and furious. Heck, on the Mac side alone, we had that Office bug in February which allowed a remote doofus to shut down your software by sending a "malformed packet," and then that other issue just a few days ago which could compromise your Mac by allowing evildoers to "run arbitrary commands." So, uh, what happened to that whole "trustworthy computing" initiative? Because right about now we trust the security of Microsoft's products about as far as we can hurl Bill Gates's net worth in pennies.

And yeah, we fully understand that these bugs were introduced long before Bill's incredible epiphany that a reputation for security might be a necessary selling point to sucker the whole planet into dumping their identities into .NET. But if you want a recent example of why that "leaked" Gatesian edict for Security Over Features was little more than a PR stunt, look no further than the Gigantic Microsoft Security Hole du jour: a few days ago, Wired reported that Internet Explorer's security settings for a given page kinda sorta don't apply in any way, shape, or form once a user moves on to another page and then clicks the "Back" button.

In other words, if we're understanding this correctly, say you visit a page packed full of nasty painful evil scripting junk, but you've got IE configured to block the code from executing automatically. Pleased with how your deft use of security settings prevented disaster, you then visit a security site you've bookmarked so you can tell them about the evil page. But you forgot to copy the URL, so you click the "Back" button... and whammo, the code executes automatically-- deleting all your files, raiding your fridge, drinking right out of the milk carton, and using the last of the toilet paper without replacing the roll. Bad, naughty, evil code.

Now, okay, we admit that this bug was certainly introduced prior to when the Shining Example of Security memo went around in January. But here's the wacky bit: when the Microsoft Security Response Center was informed of this problem, it "thoroughly investigated" the issue and finally arrived at the conclusion that "the proposed exploit scenario... does not meet [its] definition of a security vulnerability" because it "requires the attacker to compel users to click on the back button while visiting a malicious website." According to Microsoft, the scenario therefore "does not constitute a viable threat to users following standard best practices."

So there you have it, folks-- using the "Back" button in Internet Explorer isn't a standard, best security practice. Apparently everyone just knows this a priori, or at least Microsoft assumes they do, because nowhere in Microsoft's documentation does it state that using the "Back" button is only for loose cannons who are itchin' for trouble, nor is the button labeled "Back Minus Security Measures" (though maybe that full title was just truncated to fit in the toolbar). By the way, this is only a problem under Windows; the Mac version is safe. But if the official corporate reaction to this bug is any indication of Microsoft's progress down the long road to Securityville, we'd say the company is just about ready to start thinking about maybe putting on its left shoe. Who knows? Maybe by the end of the year Microsoft will even tie the laces!

 
SceneLink (3700)
And Now For A Word From Our Sponsors
 

Mash-ups and original music by AtAT's former Intern and Goddess-in-Training

Prim M at YouTube
 

The above scene was taken from the 4/19/02 episode:

April 19, 2002: In light of a class action suit that's moving forward, Apple's official stance on the lack of Mac OS X support for legacy ATI chips suddenly becomes a whole lot less final. Meanwhile, rumors fly about a new version of AirPort that runs at ten times the speed, and Microsoft informs its customers that only crazy people would ever expect security features when clicking Internet Explorer's "Back" button...

Other scenes from that episode:

  • 3698: Uh, Did It Always Say That? (4/19/02)   Boy howdy, it sure is interesting what sort of policy changes a little well-placed litigation can shake loose, isn't it? You're probably already familiar with the long-standing complaint among several Mac users that, despite the fact that their Macs (such as Bondi Blue iMacs, original iBooks, beige G3s, etc.)...

  • 3699: You Are Cleared For Takeoff (4/19/02)   Question: How can Apple make AirPort go faster? (The first person that says "grease its runways" gets a smack upside the head.) Because, as you know, we've all been hearing about faster AirPort implementations coming "real soon now" since, oh, we'd say roughly about the end of the Battle of Hastings...

Or view the entire episode as originally broadcast...

Vote Early, Vote Often!
Why did you tune in to this '90s relic of a soap opera?
Nostalgia is the next best thing to feeling alive
My name is Rip Van Winkle and I just woke up; what did I miss?
I'm trying to pretend the last 20 years never happened
I mean, if it worked for Friends, why not?
I came here looking for a receptacle in which to place the cremated remains of my deceased Java applets (think about it)

(1287 votes)

Like K-pop, but only know the popular stuff? Expand your horizons! Prim M recommends underrated K-pop tunes based on YOUR taste!

Prim M's Playlist

DISCLAIMER: AtAT was not a news site any more than Inside Edition was a "real" news show. We made Dawson's Creek look like 60 Minutes. We engaged in rampant guesswork, wild speculation, and pure fabrication for the entertainment of our viewers. Sure, everything here was "inspired by actual events," but so was Amityville II: The Possession. So lighten up.

Site best viewed with a sense of humor. AtAT is not responsible for lost or stolen articles. Keep hands inside car at all times. The drinking of beverages while watching AtAT is strongly discouraged; AtAT is not responsible for damage, discomfort, or staining caused by spit-takes or "nosers."

Everything you see here that isn't attributed to other parties is copyright ©,1997-2024 J. Miller and may not be reproduced or rebroadcast without his explicit consent (or possibly the express written consent of Major League Baseball, but we doubt it).