Philena's Portfolio

Saturday, February 28, 2009

I actually finished early today with my hussle. That's perfect. Now I can get a headstart tomorrow.
Stay Home, Make Money, while improving health, because safer is better.
Time for some "Activate". I feel a cold coming on. Immunity Boosters Here I come.

Friday, February 27, 2009

My finger hurts. I don't know why.
Feeling good about my final. So good in fact, I think I should go rape someone.

Thursday, February 26, 2009

It's a beautiful day in da neighborhood. Heello neighbor! *skippin* Tralala lalalala

Wednesday, February 25, 2009

The government has conceded that vaccines cause autism. (

Monday, February 23, 2009

Senate bill pushes employer tax credit for telecommuters - Business - (
Now I have to play with knobs like Brandie. What's really going on around here.
My furnace went out. Maintenance fixed it. Now will not shut off. I'm burning up ova here. Hot.. Windows and doors open. 90 degrees!

Saturday, February 21, 2009

Listening to: Part 2
Listening to: David Wilcock New Interview
Time to get ready for weekend guest from some of chi-towns finest. But 1st, I betta take my final.

Friday, February 20, 2009


Bling for your Web Browser

Bling, Bling for Your Web Browser

Chrome Security Issues: Style vs. Safety



to Scripting and Database with Lab

Comp230 Security Research Paper

February 20, 2009

Table of

Figure 1 Tech Terms Searched Dec.
08 2

Figure 2 Task Manager: Local
Processing Example 5

Figure 3 Error Image in Vista &
Google Chrome 6

Table of Contents

Table of Figures i

Introduction 1

Web browser
Security Issues 2

Updates and
Patches 3

Cross Site
Scripting (XSS) 4

No browser is perfect 6

Security 7

Future Problems 7

Third party
extensions 8

Conclusions 9

References 10


Google Chrome is
Google’s newest application that was build for streamlining
complex web applications for simplicity, safety, and speed. (Google)
I've been experimenting with Google Chrome for almost 4 months now,
and love the speed. But does this speed cause security risks? This
paper will explore the many features of Google Chrome and discuss
these new trends of web development. These comparisons will also
examine common security issues and how Google Chrome handles them.

Web browser Security Issues


Many users have
experience malicious software some time or another. Usually after
losing important data, or having your computer completely locked down
due to a pop-up ad to...”How I made $10,000 in 10 days!"
and next thing you know, your browser and computer is rendered
useless. Brett Burney from the Legal Tech newsletter agrees,
stating: “We've
all been warned that simply visiting a Web site can immediately
compromise the security of our computer -- along with the
confidential data that it stores

(Burney, 2009) The default
settings for web browsers are Javascript enable. The problem with
malicious scripts is browsers cannot tell the difference between
scripts generated by the website versus scripts generated by users,
for example, comments on a blog or a forum. Google Chrome has been a
popular topic and search team recently posted in eWeek, (Figure 1)

Tech Terms Searched
Dec. 08

From eWeek "In Search Of…" eWeek (2009),
volume 26 (1), p. 13-13.


Updates and Patches


With new patches and
versions to address these security issues, our web browsers need to
be consistently updated. Not long ago, updates needed to be done
manually, or you had to create your own script to check for updates.
But many programs come with auto-updates build in the application.
interesting concept is Chrome's virtual JavaScript machine, called
V8. Google's Chromium team built its own virtual environment for all
JavaScript execution
(Grimes, 2009) The Chief Information Officer’s community
and website has written numerous articles and white papers about the
Google chrome because of its innovative team up with Chromium.
(Chromium) Since Chromium has come up with their
own virtual Javascript machine, this minimizes the risk of malicious
scripts being executed.

Cross Site Scripting


When you surf a
site, a common attack is cross site scripting. JavaScripts are
scripts for the user interface to extract information about user's
activity from browser cookies and the information is used for related
links, content or events. You get an email notification from a social
network like Myspace and Facebook, and you click on the link and it
looks just like the site. Unfortunately, you may not notice the URL
of the network is slightly different or extremely long compared to
your regular reference link to check messages. Once you enter
personal information on these “phishing” sites, malicious
script now has your login information, and if it's a financial
company like Paypal, they can begin using your account information to
make thousands of dollars worth of purchases in less than 60 seconds.



Google came up with
a different solution called the sandbox. The new IE browser 8 beta
version, also has similar capacities. (Fierce, 2009)
Sylvain from the Google Chrome Browser website explains the sandbox
as follows: “If
an attacker is able to exploit the browser in a way that lets him run
arbitrary code on the machine, the sandbox would help prevent this
code from causing damage to the system. The sandbox would also help
prevent this exploit from modifying and even reading your files or
any information on the system

(Sylvain, 2008)


In other words, the
sandbox is like a separator for website processes. If you go to your
Task Manager (Figure 2), you can click on the processes tab, look at
each application you have running on your computer, and how much
memory the processes are using. What Google chrome does differently
is separating all of these processes in their own sandbox, like the
URL bar, tabs, access tokens, plugins, etc. Then Chrome will share
the common processes between websites which will increase the browser
speed and add extra security.

Task Manager: Local
Processing Example

The more javascript
on a website, the more local processing is required to load the page.
That's why many dynamic websites that have javascript takes longer
to load.


This will prevent an
attacker from going any further than the original application its
hiding under. Because according to Google chrome, it's already in
its own sandbox. Once I do have a process go down, I have the
familiar image of a dead puzzle piece on my Vista (Figure 3), but
only for that tab. Other tabs that are open within the browser are
not affected, while with other browsers, the whole application could
freeze up.


Error Image in Vista &
Google Chrome


No browser is perfect


But even with the
sandbox, Google Chrome doesn't have robust security options. And I'm
use to my Firefox adblocker, which increases the speed of firefox
browser by blocking scripts. Chrome does not give you the option to
disable Javascript like other browsers. The primary reason Google
doesn't condone disabling scripts is because that is their primary
source of revenue, Google Adsense and Adwords. While looking at
YouTube videos of my favorite computer geeks, I found a comment about
this issue, and it was suggested to use privoxy. Privoxy is a web
proxy that acts as my adblocker for Google Chrome. I was very happy
it works with Google Chrome, because now the speed is increased even
more with the sandbox. Now you can compare the two browsers with an
adblocker on both of them, and Google chrome still comes out on top.
Even without additional plug-ins. (JunkBusters)
you visit during a private session generally won't be able to access
cookies, history, or other browser data created or saved before you
entered the session”

p. 50

 Incognito mode
is a feature of Google Chrome that offers these features as many
other web browsers. I would definitely use the Incognito mode in
public access terminals. For example, I'm surfing the web at my
local public library, and using IE to check my emails and check my
social network status. Usually, I'm asked if I would like to "save
my password" of course, I always check, “Not now”,
or “never”. But if I was in a private session, I don't
have to worry about this issue. Larkins in the PC World article,
also realize that private web sessions can be considered misleading
because an average user may see this feature as an added security
stating: “Just keep in mind that they're not a panacea, and
that they're for secrecy, not additional safety”
(Larkin, 2008) p.50. The security this may add is for a
multi-users network to prevent seeing each other private information,
especially if users use the same computer like home networks. You
may also install Google Chrome without requiring Administrator-level
access. (Metz, 2008)

Password Security


You can't protect
the password manager like other browsers.
“Chrome allows the current user to reveal
the saved log-on names and passwords in plaintext with a few clicks
of the mouse”
At first, I thought this feature was very cool, especially when using
another browser and you may forget a password, or need to have text
file for passwords. Hopefully, Google will see this oversight and
let users secure their passwords. This may be overconfidence on
Google's security features. But this doesn't prevent someone copying
your info once you walk away from the computer.


Future Problems


There are many sites
I cannot access with Google Chrome. An example, of course, is the
DevryU website. There are other know issues that the Google support
(Team) knows about. Here are some of their
security flaws:

  • Google Chrome
    does not support SSL client authentication

  • Does
    not support the embedding of
    controls (I can't use Microsoft Outlook module for Igoogle in

  • Google Chrome
    doesn't work with NTLM authentication

Third party extensions

Google is starting
registration for developers to create extensions for Google Chrome.
Since Google used Chromium, they have strict guidelines for
extensions. “Extension components will typically be
implemented using web technologies like HTML, JavaScript and CSS with
a few extra extension APIs that we design. Extensions will run in
their own origin, separate from any web content, and will run in
their own process”. (Chromium) Some of
their requirements for security include:

  • It must not be possible for third-party code to get access to
    privileged APIs because of the extension system.

  • Extensions
    should be given only the privileges they require, not everything by

  • Extensions
    should run in sandboxed processes so that if they are compromised,
    they can't access the local machine.

  • It
    should be trivial for authors to support secure auto-updates for

  • We must be able to blacklist extensions across all Chromium


Google Chrome a
great browser for social networking and streaming media. But without
added security features, and expansions of utilities with 3rd-party
development, the Google chrome browser still needs a lot of work, as
its recent development for Mac’s OS and Linux, are recent
releases, it is not recommended to make it your default browser until
you know what you’re doing. Remember, Google Chrome is still in
beta, and it may take months, or even years, for a stable release.
Incognito mode is recommended with multi-user workstations and shared
computers. Finally, I recommend a proxy should be used “Under
the Hood” of Chrome’s browser management settings to
prevent malicious scripting activities.


Burney, B. (2009,
February 10). Can Google Chrome Power Your Browser? Retrieved
February 10, 2009, from Legal Tech Newsletter:

Chromium. (n.d.).
Extensions. Retrieved February 15, 2009, from Chromium
Development Documentation:

eWeek. (2009). In
Search Of... eWeek , 26 (1), 13-13. From Database ESBCO
# 36025648

Fierce, D. (2009,
January 27). Internet Explorer 8 RC1 Released. Retrieved
February 10, 2009, from Efluxmedia:

Google. (n.d.). Google
. Retrieved February 15, 2008, from Google:

Grimes, R. A. (2009,
January 26). How Secure is Google Chrome? Retrieved February
10, 2009, from CIO:

JunkBusters, I.
(n.d.). Privoxy. Retrieved December 2008, from Privoxy:

Larkin, E. (2008,
December). How Private--or Secure--Is So-Called Private Browsing? PC
, 26 (12), pp. 50-50. From Database ESBCO #

Metz, R. (2008,
September 5). Google's Chrome Browser Prompts Privacy Concerns.
Retrieved February 10, 2009, from Associated Press:

Sylvain, N. (2008, 10
2). A new approach to browser security: the Google Chrome Sandbox.
Retrieved February 10, 2009, from Google Chrome Browser:

Team, G. C. (n.d.).
Known Issues. Retrieved February 10, 2009, from Google Chrome

Thursday, February 19, 2009

I can say what I mean without knowing what I'm saying. Did I just mean to say that?

Wednesday, February 18, 2009

The river is already going to the ocean. Life is a river. Don't push it and you will not be miserable.
Bat dad knows no pain.. bat dad knows no fear. Prepare to be Bat-Dadded!!!

Tuesday, February 17, 2009

I want to be about to ping my blog on blackplanet (

Monday, February 16, 2009

Amanda L. French, Ph.D. Facebook gettin hated on... (
Twitter - GoToWebinar (
He was a common man expanded into giant proportions; well acquainted with the people, he placed his hand on the beating pulse of the nation

President's Day Salute

%u201CThe only purpose for which power can be rightfully exercised over any member of a civilized community against his will is to prevent harm to others.%u201D John Stuart Mill

Sunday, February 15, 2009

Commenting on - Why Do Some Women Freak Out On Their 30th Birthday? - April Sims (
I'm glad the weekend is extended for many. Enjoy your day.

Saturday, February 14, 2009

My cuzo just txt'd me & said its full of angry women. Lol. That doesn't sound fun.
I was suppose to meet cuzo @ 2nd wind, & I think my DS played w/int lights on the car. Now I need a jump.
BJ woke up and I said Hi, and he waved. Then I said, Good Morning, and he grabbed my neck and said, No Morning!

Friday, February 13, 2009

Oh painatrate, oh painatrate, thanks for stopping the backache.

Thursday, February 12, 2009

No Class because the wind knocked the power off the school. It's about time its not my crib this time.

Wednesday, February 11, 2009

Tornado warnings here in Ohio. And Tornados in Hawaii? What's next? "We're not in Kansas anymore?"
Is wondering why kids like to bite the eraser head off pencils.

Tuesday, February 10, 2009

Reading: Country Club Hills killins? (
This change of weather can increase colds and viruses. But hey, at least we can give the heating bill a break.

Sunday, February 8, 2009

Its time for me to start a Sunday afternoon horseplay match.

Saturday, February 7, 2009

I feel a lot better now. Time to enjoy the warm up.

Friday, February 6, 2009

Today is starting to get reeeeeeally aggravating.
I thought I could get away with a ghost image for Linux in the lab directory. Now I gotta go buy a blank CD for ubuntu. *sigh* Priorities

Thursday, February 5, 2009

Disk cleanup, defrag, deleted program & old files, archived to USB, cleared old backups, deep cleaned. 48Gbs freed & cleared. Shame on me.
Now that I'm done organized my paperwork, my network is next.

Wednesday, February 4, 2009

Big Momma BeatDown (
Big Momma BeatDown (
Ok..back to study

Tuesday, February 3, 2009

is finally done with most of the paperwork today.
I hate paperwork and filing.

Monday, February 2, 2009

Eating chicken & cheese nachos with multi-grain tortilla chips from last night. Plenty of sauce left. Come help me finish it off.
Up to 3 glasses of water now. Body feeling normal again. Maybe I can be productive today.

Sunday, February 1, 2009

Now comes the best part. Cleaning up. *crack a beer open* I got most of it done. Til Monday.
Superbowl party hostess supreme!