- Joined
- Oct 9, 2007
- Messages
- 47,297 (7.53/day)
- Location
- Hyderabad, India
System Name | RBMK-1000 |
---|---|
Processor | AMD Ryzen 7 5700G |
Motherboard | ASUS ROG Strix B450-E Gaming |
Cooling | DeepCool Gammax L240 V2 |
Memory | 2x 8GB G.Skill Sniper X |
Video Card(s) | Palit GeForce RTX 2080 SUPER GameRock |
Storage | Western Digital Black NVMe 512GB |
Display(s) | BenQ 1440p 60 Hz 27-inch |
Case | Corsair Carbide 100R |
Audio Device(s) | ASUS SupremeFX S1220A |
Power Supply | Cooler Master MWE Gold 650W |
Mouse | ASUS ROG Strix Impact |
Keyboard | Gamdias Hermes E2 |
Software | Windows 11 Pro |
Adobe is working on a new sandboxed version of the Flash Player browser plugin for Firefox. The move will make it tougher to compromise a system's security using malicious Shockwave Flash objects. The new plugin for Firefox (and other browsers like Opera, which rely on the common Netscape Plugin Wrapper model of browser plugins), will work essentially similar to the Flash Player Google Chrome ships with, which works in a "Protected Mode". When "sandboxed" Shockwave Flash objects in webpages will work as separate processes, with much lower privileges than the actual user, the user's machine environment will be kept abstract to it. Adobe has already redesigned the browser plugin of its Reader X (PDF viewer) to work this way, and hasn't seen a significant successful exploit since November, last year.
View at TechPowerUp Main Site
View at TechPowerUp Main Site