I miss read the title as:
‘The trinity of IRA security explained’.
I expected a detailed piece on Knee-Capping, Intimidation and Bombing...
Which I could follow up with a query for the I.T. angle...
In my defence, Paris would have been confused, too.
The trinity of RIA security RE-explained
The trinity of RIA security can best be summed up as:
Zip, Nada, Zilch.
We've known this ever since Active-X was first deployed. Here's Microsoft's "First immutable law of computer security":
"Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore."
Here's DaveK's corollorary to the first immutable law of computer security:
> If you let remote websites execute code on your computer, it's not your computer any more.
When combined with DaveK's axiom of rich internet application security:
> Microsoft invented Active-X /so/ that remote websites can execute code on your computer.
It leads us to DaveK's syllogisms of computer security:
>1. If you let Microsoft execute code on your computer, it's not your computer any more.
>2. Microsoft are the "bad guys".
- +Comment Trips to Mars may be OFF: The SUN has changed in a way we've NEVER SEEN
- Vid Find email DIFFICULT? Print this article out and give it to someone 'techy'
- Back to the ... drawing board: 'Hoverboard' will disappoint Marty McFly wannabes
- Google+ goes TITSUP. But WHO knew? How long? Anyone ... Hello ...
- Pic Forget the $2499 5K iMac – today we reveal Apple's most expensive computer to date