There Is No Safe Web Browser 444
Michael writes "David Sheets has up an interesting article on browser security, and I have to agree with his conclusion: no web browser is safe. The article details the recent Netscape fiasco, and touches on the whole Firefox/Internet Explorer debate. From the article: 'So if it sounds as if we're all at the mercy of hackers just looking for some new challenge, that's partially true. As law enforcement officers will tell you, crime finds you if it wants you bad enough, no matter what preventative measures you take. But the vast majority of criminals have an Achilles' heel: They prefer convenience to challenge. For now, it's more convenient for them to pick on Internet Explorer.'"
Lynx is safe (Score:4, Funny)
Re:Lynx is safe (Score:2, Funny)
Re:Lynx is safe (Score:3, Informative)
Here you go!
http://img184.echo.cx/img184/7750/lynx026bk.jpg [img184.echo.cx]
http://img184.echo.cx/img184/3108/lynx013je.jpg [img184.echo.cx]
Re:Lynx is safe (Score:3, Informative)
Re:Lynx is safe (Score:2, Funny)
girl-on-girl.jpg - oh yeah!
Re:Lynx is safe (Score:5, Funny)
Be careful!!! (Score:5, Funny)
I telnetted to port 80 once, and interpreted the HTML in my head.
Unfortunately there was a infinitely recursive Java script function on there.
I'm still not quite myself.
Re:Lynx is safe (Score:2, Troll)
Re:Lynx is safe (Score:4, Insightful)
Re:Lynx is safe (Score:3, Funny)
Re:Lynx is safe (Score:3, Insightful)
Oooo you mean rules aren't universal?! Whoa! You see, the term "topic" is a moving target. It changes from thread to thread and thus it is logical to mod things offtopic relative to the topic at hand. At the same time, though, I think the off-topic mod is bunk. Slashdot discussion threads evolve over time, topics change, and most off topic posts are more intriguing and insightful t
Dictionary Security Definition (Score:5, Interesting)
The implication of this article stems in the absolutes of security: can it ward off intruders or not. This is a flawed approach, and while seemingly a logical one, denounces another reality of this level of breach: the lion's share of these breaches are not of the most malicious sort (read: that stupid data miner which causes popups, search bars from hell, etc). These kind of easily hackable sections of Internet Explorer are less prevalent in Firefox. Market forces of the sheer user base would dictate that if this were not so, more spyware would have been ported to Firefox by now. 25 million downloads, right? That's a sizable chunk for any malware vendor, or aspiring intruder, to infiltrate.
One must acknowledge the reality of security by statistics alongside security by absolutes.
Re:Dictionary Security Definition (Score:3, Informative)
Re:Dictionary Security Definition (Score:3, Interesting)
IMHO, the biggest security threat on the web today is the prevalence of phishing expeditions, intentional spyware downloads, and the general naiveté of the users. When is the last time somebody's SSN was stolen through cross-site scripting or other browser holes? Probably just
Re:Dictionary Security Definition (Score:5, Insightful)
I have Firefox on a computer, and it's 100% safe. I have IE loaded on that machine, heck it's unpatched Win2K, and even that's 100% safe. The reason it's "safe" is because the power supply died a few months ago and I haven't been able to turn it on.
So in this case, 100% safe = 0% usability. Which doesn't help me much, there has to be some acceptable level of "safe" that corresponds to a high level of usability, and that's where Firefox wins over IE.
Re:Dictionary Security Definition (Score:3, Insightful)
(No browser) is safe.
No (browser is safe).
The former is probably true. Well, unless you have outlook.
Re:Dictionary Security Definition (Score:3, Interesting)
Parent makes a good point.
Absolute security is impossible. Not even NASA of the 60s and 70s has been able to write large pieces of bug-free software, and they had one of the best QA systems ever. Moreover, the costs were incredible (you wouldn't really want to pay for the development costs of bug-free Windows, would you?). However, the kind of absolute reliability NASA was aiming for is only relevant for software that will be used for a limited time, in a controlled environment. For modern-day web
I don't think you understand economics (Score:5, Insightful)
If 1 hack hits 90% of the market, spending more money to get a hack for the rest may not be worth the effort even if Firefox has as many holes as IE. Simple economics.
Re:I don't think you understand economics (Score:3, Insightful)
(nods, pats trusty G5 PowerMac)
I'll go even further. (Score:4, Insightful)
The FIRST aspect of "security" is limiting the avenues of attack. You sort of touched on that, but I'll say it explicitly.
If FireFox doesn't run ActiveX, then that is one avenue that is NOT available for an attack.
As others have pointed out, lynx is very secure and that is because it completely blocks so many avenues of attack.
Exactly. Now, from TFA:
If they say that, then they are wrong.
Look at the typical junkie on the street. He's be happy to rob a bank. But the bank's security system is beyond his capabilities to SUCCESSFULLY attack.
So he picks easier targets with LOWER payoffs (mugging pedestrians).
Which brings me to the SECOND aspect of security: Build the defenses on the available avenues to defeat the attacks.
Sure, there are criminals out there who can pick any lock and defeat any alarm system. But they are very few and very far between. The odds that you, specifically, will be targetted by one of them is less than the odds of you winning the lottery.
So, contrary to what TFA says, crime will NOT find you if it wants you bad enough. It has to want you bad enough AND be intelligent enough AND be skilled enough.
Sort of. More accurately, they're lazy. The "vast majority" will NOT spend time and effort to learn how to bypass alarm systems. If there's an easier target, they'll go for it.
If your (and your neighbor's) defenses are more than they can bypass, they'll leave the area.
No. While it is more "convenient", that is NOT the reason that IE is subject to all the attacks.
The reason is that the level of skill/intelligence required to successfully attack IE is SO VERY LOW. ANYONE with a bit of programming skill can write an exploit for IE.
Sure, any junkie can get a knife, and a knife is good enough for a mugging. But that knife isn't going to get you very far in a bank robbery.
Again, it isn't about the POTENTIAL targets.
It's all about the AVAILABLE targets in your SKILL RANGE.
Which is why Open Source has such a great security rep. There aren't any market forces or deadlines to deal with. It's ready when it is ready.
This gets back to your statement on statistics and "the absolutes of security".
Sure, my system is vulnerable.
An attacker has to get to Seattle.
And into the office building.
And disable the cameras.
And disable the alarm system.
And break into the office.
And blow the server room door.
And then steal the server.
I'm not losing any sleep.
No browser is safe? (Score:4, Funny)
Re:No browser is safe? (Score:3, Informative)
Re:No browser is safe? (Score:5, Interesting)
This sort of thing may have already happened to you. Have you ever accidently just catted a binary file, and then discovered that your command history had all sorts of garbage commands in it? Same thing.
This sort of vulnerability has been around for decades. People used to trigger it via `talk' requests or by using the `write' command, and while talk eventually learned to filter things better, as for write eventually everybody just did a `mesg n', because all write does is write text to your tty, so changing write won't help. Of course, fixing xterm and other terminal emulators is another fix, but these features can be useful too. Still, I'm surprised that they haven't been disabled by default, but even today, xterm seems to have this `problem'.
Many vulnerabilities are caused by this sort of mixmash of different utilities -- in this case, netcat doesn't really have the vulnerability, but it would allow text to come in that could affect your terminal emulator.
Yes, with the right filtering of the output this could be safe, but not with netcat by itself. Still wouldn't make it a non-crappy browser though.
Re:No browser is safe? (Score:5, Informative)
Re:No browser is safe? (Score:2, Funny)
Re:No browser is safe? (Score:3, Insightful)
If I'm reading it right, the vulnerability you linked to is one where the command that runs lynx causes it to send false information to the web server. I don't think that "user can trick browser into sending false data to server" belongs in the same category as "server can own machine running browser."
Of course nothing is perfectly safe, but that's why being safer is a big deal. (But I don't use lynx.)
Re:No browser is safe? (Score:4, Funny)
Anyone willing to browse like a real man is completely secure from hackers.
Doesn't go far enough. (Score:5, Insightful)
David Sheets has up an interesting article on browser security, and I have to agree with his conclusion: no web browser is safe
No program that accepts input is safe. Even some programs that don't accept input aren't safe either. It is the nature of how complex software really is and how little of it we understand.
Re:Doesn't go far enough. (Score:4, Funny)
Re:Doesn't go far enough. (Score:2)
Re:Doesn't go far enough. (Score:2)
Re:Doesn't go far enough. (Score:2)
Yeah, I hate it when apps spontaneously get possessed.
Re:Doesn't go far enough. (Score:2)
My program is perfect.
Nor is there a "safe" OS.... (Score:5, Insightful)
TW
Re:Nor is there a "safe" OS.... (Score:2)
Re:Nor is there a "safe" OS.... (Score:5, Funny)
I can't speak for Linux users as I am not one, but I can speak for some Mac users. We don't ignore the bugs, hacks and patches out there. I keep my system fully patched at all times, just as I dio my Windows boxes. The difference here is that my Mac has never had a spyware infestation, nor a virus, nor any of the other intrusive attacks that my Windows machine has suffered through. And I'm careful with my Windows machine.
Windows has gotten safer as MS has finally deigned to pay attention to safety concerns. But a fresh Windows install is as unsafe as a child molester in a maximum security prison. A significant number of patches and extra utilities need to be installed, many of them only practically available from the Internet, before it is reasonably safe to connect that computer to the Internet. This is not true for Linux and OS X bioxes.
Re:Nor is there a "safe" OS.... (Score:5, Insightful)
Even apologists for MS poor security record acknowledge that firefox is more secure, if only with the argument "when more malware starts targetting it, then it will be just as bad"
And the same applies to OS security as well. Safe is a relative concept, and to try and confuse the issue by casting it as an absolute does no one any favours.
For that matter... (Score:3, Insightful)
I've been managing Macs on the network for almost a decade, and have yet to deal with spyware. Viruses, I think I've had 5 or 6 incidents, and most of those were Word macro viruses, which are relatively benign on the Mac because of the different file system structure.
OS's in the same boat? (Score:2, Insightful)
I would be willing to wager a very large bet that if Mac OS X was the industry leader there would be the same difficulties with viruses, and other criminal activities that are curr
Re:OS's in the same boat? (Score:4, Insightful)
Why would this not happen (or at least happen far less frequently) on OS X? Because none of the services are enabled by default. Samba, AFP, SSH, Apache, everything is off. In order to infect a Mac OS X machine, it would take more social engineering than to infect a Windows machine. A Mac OS X user, to really, really do harm to the entire system, has to be tricked into entering his administrator password, even if he is logged in as an administrator.
Microsoft has acknowledged this flaw. They want to transition users to a model of the lowest possible privilege assignment. If a user doesn't need to be an administrator, he shouldn't be. Unfortunately, as Microsoft has also acknowledged, there is too much poorly-designed Windows software that won't run unless the user is an administrator (even though the software does nothing that requires administrative privileges
In Mac OS X, software installers must acquire administrative rights by getting the user to authenticate as an admin if they want to write to anything that isn't in the current user's space. Apple encourages developers to avoid having the user authenticate authenticate at all costs and to only attempt to gain admin privileges if absolutely necessary. That is smart design, and since it's been that way since 10.0, there aren't very many applications that absolutely require an administrator for no reason.
Re:OS's in the same boat? (Score:3, Interesting)
Re:OS's in the same boat? (Score:3, Interesting)
Servers are very much a minority presence on the internet.
And these are far more interesting target than desktop for crackers.
Not in general, they're not (there are exceptions, of course, but the following caveats apply to them even more). Servers are far more likely to have competent people running them, be up to date with security fixes and have abnormal behaviour quickly identified.
In short, a Linux server
Hit the Nail on the Head (Score:5, Insightful)
As firefox gains in popularity, expect that the number of exploits aimed towards it will continue to rise.
That being said, the nice thing about firefox (and OSS), is that lots of eyeballs can look at, and fix, the code in a timely manner.
Re:Hit the Nail on the Head (Score:5, Insightful)
If it turns out that there is some feature or technique that really should never be in a browser, we have some hope that Firefox would expunge it and do so quickly.
wait wait WHOAA (Score:2)
Obvious -1 (Score:5, Insightful)
Perhaps it needed to be said (Score:3, Funny)
I'm sure I'll be modded down for just posting my blunt thoughts in responst to the post.
This just in! (Score:5, Interesting)
I for one use Firefox, because it is MUCH more secure than IE. It may not be perfect, but it's by far good enough for regular use.
That's like saying that houses aren't secure, even the new model homes with electronic alarm systems. No crap, but that doesn't mean sell the alarm systems and leave your front door unlocked (like IE).
-Jesse, disliking alarmist poop articles.
Re:This just in! (Score:2)
Of course nothing is safe. Even if your computer is completely invulnerable to outside exploits, if someone is *really* determined they can break into your house, wait for you to log in as root, and then garotte you to have full access to your computer. Does this somehow justify running IE/Windows? No.
Heh, speaking of home security (Score:3, Insightful)
So.... I guess i should just change my browser identification string to say FireFox 1.04
Integration with the OS is B-A-D.. BAD (Score:5, Insightful)
What?? (Score:2)
Seriously, is this supposed to be news?
Re:What?? (Score:2)
Always protect yourself... (Score:4, Funny)
Re:Always protect yourself... (Score:2)
It seems to me... (Score:2)
what? (Score:2, Funny)
Only a sith lord deals in absolutes. I will do what I must.
Safe Browser (Score:2)
Come on (Score:5, Insightful)
Browsers can be totaly safe, as much as I hate to say it, IE can be pretty safe too. just follow these rules:
1:USE A FIREWALL
2: update your browser
3:disable ActiveX, any site that uses it is a site you should learn to live without.
4: (the one most often broken) DONT CLICK YES ALL THE TIME, warnings are there for a reason.
5: Dont DL and run STUPID executables
Most Browsers do a decent job of protecting you fron the bad stuff, but NOTHING can protect you from yourself, short of cutting the cable, and if you do that, dont run with scisors
Re:Come on (Score:3, Interesting)
For all things Firefox is, "small and light" isn't one. It chews up a lot of memory and (depending on what the pages loaded are doing) CPU time.
I don't know what standard you're measuring Firefox against to call it "small and light", but it sure as hell isn't IE.
[...] NOT built into the OS, [...]
This point gets belaboured all the time like it's some major design flaw or abnormality. In fact, IE is no more "built into the OS" than khtml is into KDE, Quicktime is into O
Well.... (Score:2)
What about konqueror? (Score:2)
Re:What about konqueror? (Score:2)
FYI, rocker navigation is a gesture you perform with your mouse buttons. By 'rocking' your fingers over the right, then left button you execute the 'back' history action. Going forward in history is the opposite rocker gesture.
Re: (Score:2)
Want a secure webbrowser? (Score:2)
This is much harder to achieve with respect to internet explorer, because it's more deeply entrenched in the operating system. Its HTML control (the actual renderer) is used in zillions of places whe
Net+ all the way baby! (Score:2)
There is so a safe browser! (Score:2)
-carl
wow (Score:3, Insightful)
AFAIK, Firefox has quite good security track and fixes things fast. That's what matters. Firefox is a "secure" browser by any measurements, and unlike other browsers, they deserve the reputation they have.
And one of the reasons why Firefox has security bugs is because it's a evolving product. Internet explorer however is a 3-years-old code base which has not changed almost nothing. Mozilla and firefox have been being updated for years to support modern standards etc, Internet explorer has done nothing.
(Actually, it's suprising that after so many time people still finds bugs in internet explorer. It shouldn't have so many bugs left - look at sendmail, bind etc, they're crappy software from a security POV, but their code base is _so_ old that it's very hard to find more security problems. Internet explorer must be really buggy to keep such bad security track)
Only the Sith... (Score:3, Insightful)
patch turnaround time (Score:2, Interesting)
Define ``safe'' (Score:3, Informative)
If you mean: ``not the easiest target for the bad guys'', then most browsers are safe, most of the time.
I'd say that any browser which consistantly avoids being the lowest-hanging fruit is as close to safe as most of us need. To achieve that, all you need is a development team that emphasises security, even at the expense of convenience, and gets useful patches out, fast.
I can think of one browser with a large market share which fails both those tests, and I suspect there are several with smaller market shares which do fairly well on both those criteria.
Duh... (Score:2)
Your web browser is absolutely safe as long as your computer doesn't have a network connection and you don't load any unsafe software (i.e., Windows). That reminds of the good old days of the Altair [apple2history.org].
We want to have a safER browser (Score:2)
Security almost *never* absolute (Score:2)
It is all about convinence, rarely numbers (Score:2)
This is a tired subject (please read on) (Score:4, Interesting)
First off, it amazes me that I have run across paranoid *NIX sys admin friends who are very mindful of what runs as "root" on servers they control but then turn around and operate day to day on Windows desktops as an administrator.
Well, gee dip sh*ts, no wonder you're screwed if rogue code enters your system.
If people used limited accounts and then used impersonation (ever hear of "runas") under Windows, all of these discussions would go the way of the dodo bird.
More to the point they would be TRULY irrelevant. Sure send me to some baddie site, won't do much on my system. Whatever malware sent down the pipe to me can't do anything to change my system (C:\WINDOWS).
This is how I operate, i.e. a limited account desktop. The admin account is just that, for ADMINISTRATION, e.g., setting up new apps.
Amazingly, this approach is "novel" among even tech types since I keep hearig these discussions even on Slashdot.
The principle of least privilege is ANCIENT. Impersonation is part of Windows. Just as it is with other OSes.
The Windows NT kernel has had security since its inception. On the file system, registry as well as synchronization mechanisms such as mutexes, semaphores, etc.
Do you want to know why MS doesn't leverage it? Cost. Plain and simple. If WinAmp (which doesn't work under a limited account) stops working for someone on account of MS automatically setting up limited accounts for people, guess who is likely to start receiving support calls? "But it always worked on Windows 9x!!!"
Yes, it boils down to money. This is NOT a technical problem. MS alongside companies peddling its wares (Dell, Gateway et al) simply do not want to deal with the potential legacy costs of supporting misbehaved apps and/or apps whose designers were myopic and assumed the ability to write to any part of the file system and/or registry.
The great thing is, even with a limited account desktop you can still readily run WinAmp. You just have to know how.
All of this seems like "rocket science" to everyone. And I guess it is, since this discussion keeps rearing its head, namely browser security. The point is, a browser is another app that inherits default credentials from your login. Don't operate as administrator geniuses (sarcasm in case you didn't figure that out).
In the case of WinAmp. I simply defined an admin account that I leverage to run that application on my limited desktop (use the command line "runas" facility or change the properties on the shortcut through the "Advanced" button). I might mention that Shoutcast servers are capable of sending URLs (think JavaScript) that WinAmp will readily execute via IE totally disrespecting your browser choice. So taking another page from what Windows has offered from the start, I changed the ACLs for the IE executable such that my "WinAmp User" has absolutely no rights to the IE executable. Not even the ability to read that file. In this manner I short circuit this potential threat vector. In addition I changed the ACLs on C:\WINDOWS and some other directories so that this "WinAmp User" could only read from these directories.
Here's the moral of the story folks, use a limited account. Plain and simple. End of story. End of this not very worthwhile discussion (among tech people).
Yes I use LINUX, I use Cygwin's X server and readily use LINUX Mozilla complements of the latter. Not just a little, a lot. This IN ADDITION to the fact that I use a limited account for day to day activities.
I have never had spyware or a virus on my system. EVER.
-M
Re:OK, so Windows, *in theory*, is secure. (Score:3, Interesting)
These misbehaveed applications is the critica reason MS doesn't push the use of limited accounts more (easy enough to setup when a contemporary version of Windows was being installed).
It all goes back to what I said in my original posting,
fine, then (Score:2)
So how about not everybody using the same browser? How about having a very diverse browser population? Ignoring design flaws (such as the one in IDN earlier), if all browsers were used in relatively equal proportions, it would make it at least marginally less effective to attack any one single browser.
Lynx (Score:2, Insightful)
Opera makes you safer! (Score:2, Insightful)
Plus, by turning off all those nasty things and having a non-standard browser, it's a lot harder to become infected - unless you actually click that link and save the file
Doesn't make sense (Score:3, Interesting)
How to make a safe web browser... (Score:4, Informative)
It's really rather sad that we've given in to the idea that writing secure large-scale software is essentially impossible. It's not. It's only impossible in the paradigm we use.
Here is how security works on every major OS and in every major programming language today:
Here's how it should work:
This is called Capability-Based Security. Hopefully it is easy to see why the latter would make security much easier to manage. If not, you can read this discussion [skyhunter.com] of the concept.
CBS allows you to execute code without trusting it. In Unix, you'd have to create a new user with no permissions to run your code, which is way too much work for most purposes. In CBS, you can set up every single program to have a different set of permissions based on that program's needs. Furthermore, the program can internally manage those capabilities to insure that only a small amount of the program's own code has access to them. Then, as long as that code is secure, the program is secure, but even if it isn't, the worst it can do is abuse the capabilities you explicitly gave it.
How does this relate to web browsers? Well, a web browser really only needs the capability to render to its GUI window, read its install files, and read/write its config and cache. So don't give it any capabilities beyond that. Voila, now it does not matter what malicious program takes over your web browser, because it can't do a thing to your system.
I use (Score:3, Insightful)
What I can state is that since I've been using Konqueror (khtml, like Apple's browser) on Linux, I've never had an issue with spyware or adware. Never. I've never had a problem with security, even though there have been security alerts for konqueror as well as the other browsers. Konqueror makes it simple to surf without images turned on (one button click on top of window without going into drop down boxes to turn images on), makes it simple to surf without javascript turned on (simple and fast two step process to turn it on for a web site, can specify in settings which web sites to turn on javascript by default if needed regularly), and makes it a satisfying all-around experience in using the web.
I help adjust/maintain/bugfix windows for another user and I just can't understand how windows users can possibly put up with the spyware/adware. Taking a look at server logs, I can't believe how many people's browsers are infected with FunWeb, something else "Fun", and other spyware.
If you are a windows user, do yourself a favor and visit a friend's website (after alerting them) and ask them to send you a copy of the log entry from your visit. If your browser is infected with spyware, it just may show up as part of the browser identifier.
The ability of spyware/adware to infect a windows computer is a serious security problem. If you've been infected, you are running a system that is insecure. Please re-read that last sentence. If you've been infected with spyware/adware, you are running a system that is insecure.
Re:I use (Score:3, Interesting)
That's not what the security alert says. As I read it, if you load such a png and have an unpatched version of Mozilla or Konqueror and are using the unpatched version of libpng, it is possible for someone to run hostile code on your machine. In theory the code could then exploit security holes in your system to get access to root.
So access to root via
Mail (Score:3, Interesting)
Now, if well we can say that no matter how unsafe is to climb the himalaya with beach clothes compared with staying in your house (a meteor could fell over you, after all) you are not complelely safe, these are very different kind of probabilities, and experience tolds us that in average you are i.e. far unsafe playing with MS IE/Outlook/Windows than with Firefox/Opera/Thunderbird/Linux.
Safe web browsers (Score:3, Insightful)
No safe browser? (Score:3, Interesting)
Safari? (Score:4, Interesting)
I think the fact that OS X throws up an auth login whenever any app tries to access a directory that the current user doesn't own, pretty much makes casual takeover difficult, even by an insecure web browser...
You are all wrong (Score:3, Insightful)
There are safe languages.
There exists formal methods.
There are best practices in programming.
There exists tools for source code verification.
If you program and don't care about any of these things, hey, guess what - you're 20 years behind in your programming practices and your reading list. Even if you program in C, you can adopt better practices (*).
90% or more of the problems related to software security spring from C/C++ hacking without any method of program verification for correctness. Just read a security site vulnerabilities list.
If only people were to program: medical; military; aerospace software like Firefox or IE programmers, the we'd all be dead one way or another by now.
(*) see OpenBSD for instance and compare their security advisories with Linux or Microsoft.
PS: Just one such example of a little used tool: CIL - Infrastructure for C Program Analysis and Transformation [berkeley.edu]
Re:I want you to meet my little friend (Score:4, Informative)
Re:I want you to meet my little friend (Score:4, Interesting)
http://www.vrlteam.org/home.asp?vrl=advisories&ad
Re:I want you to meet my little friend (Score:4, Interesting)
if you don't do proper bounds-checking on your "hello world" array, then you need a security patch...
[ducks and runs...]
Re:I want you to meet my little friend (Score:2, Informative)
Hello World uses the C libraries. printf has been patched before, plenty of format string vulnerabilities.
Lynx isn't safe either ... (Score:3, Insightful)
Re:Yes there is (Score:2, Funny)
Yeah, it's really hard to animate the flash stuff and streaming media though. Brings a whole new meaning to dropping frames.
Re:Yes there is (Score:3, Funny)
Actually, it's more secure if you travel to the server where the information is stored, remove the hard drive, and perform forensics on it to determine what the data you are seeking is.
Re:IE update (Score:2)
Re:IE update (Score:2)
April 15, 2005. There may be newer ones, but that's the most recent auto-update I recieved.
Re:And in other breaking news.... (Score:3, Funny)
Re:C/C++ the problem? (Score:3, Interesting)