You are viewing an obsolete version of the DU website which is no longer supported by the Administrators. Visit The New DU.
Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Reply #113: JavaScript is also stateless. [View All]

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
longship Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-18-06 04:50 PM
Response to Reply #108
113. JavaScript is also stateless.
Edited on Sat Mar-18-06 05:21 PM by longship
I use CGI all the time. But the CGI code on my Web server is written securely. JavaScript is purposefully stateless. Yes, there are exploits, but administrators try to keep things up-to-date and these are plugged, hopefully quickly. That's why I run only peer-reviewed, open source software on my machines. Exploits are patched quickly.

Plus, there's the issue that the Javascript exploits expose the server end, not the client end. And yes, there are also exploits on the client end. Anybody who uses Microsoft IE is crazy because it has so many unpatched exploits. That's why I use Firefox which at least gets patched in a timely manner.

If somebody wants to hack my port 80, all they will get is my Apache Web server. It is the only thing which answers on port 80. Web browsers do not answer port 80 since that port is reserved for Web *servers*. Web browsers connect *to* port 80, not the other way around.

Exploits happen, but the government that wants to take the trouble to find exploits for all the particular connected machines is foolish when they can just sit on the line and read whatever comes across it.

Have you heard of Echelon? The NSA is this very minute reading a vast proportion of Net traffic including possibly this very post. And they don't need to open any ports, hack any machines, or try to install viral code on my Linux boxes to do it.

Information that goes across the Internet is *not* secure. It has *never* been secure and it never will be secure. Once one knows that, one can relax and not worry about governments making individual connections to individual machines because they already have the tools to read everything we do here without going to that trouble. So sleep soundly and resign yourself to the fact that these extra connections are almost certainly normal Web traffic.
Printer Friendly | Permalink |  | Top
 

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC