<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
 xmlns:blogChannel="http://backend.userland.com/blogChannelModule"
>

<channel>
<title>Topic &#x27;The real issue&#x27; in forum &#x27;&#x27; - dslreports.com</title>
<link>http://www.dslreports.com/forum/The-real-issue-22272882</link>
<description></description>
<language>en</language>
<pubDate>Sat, 26 Mar 2022 14:02:33 EDT</pubDate>
<lastBuildDate>Sat, 26 Mar 2022 14:02:33 EDT</lastBuildDate>

<item>
<title>The real issue</title>
<link>http://www.dslreports.com/forum/The-real-issue-22272882</link>
<description><![CDATA[Johnny posted : The issue here isn't Fox News, it isn't Karl, and it isn't anything to do with the usual security experts' advice not to surf suspicious websites.<br><br>If this required an OK and the entry of an admin password, then it's a socially-engineered Trojan that no OS can ever possibly guard against.<br><br>But according to the article, no user intervention is required.<br><br>The question then becomes why so many people continue to use software that will allow malware to be installed simply by viewing an ad? How can that possibly get past the first level of QA? Why would any browser allow code to be executed that way? And why would any OS allow code to be executed at the root level without authorization?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/The-real-issue-22272882</guid>
<pubDate>Tue, 21 Apr 2009 14:12:01 EDT</pubDate>
</item>
</channel>
</rss>
