- Joined
- Oct 9, 2007
- Messages
- 47,670 (7.43/day)
- Location
- Dublin, Ireland
System Name | RBMK-1000 |
---|---|
Processor | AMD Ryzen 7 5700G |
Motherboard | Gigabyte B550 AORUS Elite V2 |
Cooling | DeepCool Gammax L240 V2 |
Memory | 2x 16GB DDR4-3200 |
Video Card(s) | Galax RTX 4070 Ti EX |
Storage | Samsung 990 1TB |
Display(s) | BenQ 1440p 60 Hz 27-inch |
Case | Corsair Carbide 100R |
Audio Device(s) | ASUS SupremeFX S1220A |
Power Supply | Cooler Master MWE Gold 650W |
Mouse | ASUS ROG Strix Impact |
Keyboard | Gamdias Hermes E2 |
Software | Windows 11 Pro |
Adobe is working on a new sandboxed version of the Flash Player browser plugin for Firefox. The move will make it tougher to compromise a system's security using malicious Shockwave Flash objects. The new plugin for Firefox (and other browsers like Opera, which rely on the common Netscape Plugin Wrapper model of browser plugins), will work essentially similar to the Flash Player Google Chrome ships with, which works in a "Protected Mode". When "sandboxed" Shockwave Flash objects in webpages will work as separate processes, with much lower privileges than the actual user, the user's machine environment will be kept abstract to it. Adobe has already redesigned the browser plugin of its Reader X (PDF viewer) to work this way, and hasn't seen a significant successful exploit since November, last year.

View at TechPowerUp Main Site

View at TechPowerUp Main Site