back to article The trinity of RIA security explained

The phrase "Rich Internet Applications" has become a popular term for applications that run inside your browser or on your desktop and that interact with web applications or web services. RIA platforms include JavaScript (part of the AJAX umbrella), Adobe System's AIR, Microsoft's Silverlight, Java applets, and Java JFX from Sun …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Paris Hilton

    I miss read the title as:

    ‘The trinity of IRA security explained’.

    I expected a detailed piece on Knee-Capping, Intimidation and Bombing...

    Which I could follow up with a query for the I.T. angle...

    In my defence, Paris would have been confused, too.

  2. DaveK
    Stop

    The trinity of RIA security RE-explained

    The trinity of RIA security can best be summed up as:

    Zip, Nada, Zilch.

    We've known this ever since Active-X was first deployed. Here's Microsoft's "First immutable law of computer security":

    "Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore."

    Here's DaveK's corollorary to the first immutable law of computer security:

    > If you let remote websites execute code on your computer, it's not your computer any more.

    When combined with DaveK's axiom of rich internet application security:

    > Microsoft invented Active-X /so/ that remote websites can execute code on your computer.

    It leads us to DaveK's syllogisms of computer security:

    >1. If you let Microsoft execute code on your computer, it's not your computer any more.

    >2. Microsoft are the "bad guys".

This topic is closed for new posts.