Mozilla Remote Exploit

Looks like a remotely exploitable hole has been found in Mozilla and Firefox. ‘Course, given the percentage of these browsers in the browser population one might be forgiven for not looking at this advisory with the attention it deserves. I bet a large minority of the visitors here and to linux.ie use the Mozilla family of browsers however.

Still, it’s been fixed in Moz 1.7 and FF 0.9, so upgrade, there’s no reason not to!

Cache Bashing Google API Used In SEO War!

This is a nasty way to get your Google ranking up! Copy content from your competitors sites and once you have a higher Google ranking than them Google will discard your competitor’s sites because of the duplicate rule.

This tactic suggests to me at least two major dangers – the first is that your competitors can copy your site, cloak it, and possibly knock your site out with Google’s duplicate content filter. I’m looking into this more, so don’t get all worried. I’m not sure how widespread or dangerous this could be.

DomainKeys – encrypted and verified email

Now this looks very interesting – DomainKeys is a method for verifying email. It uses a public/private key infrastructure to verify the domain an email was sent from. Public keys are distributed by DNS.
Yahoo! has been granted a patent on the framework which annoys some but their license terms seems rather liberal, even allowing one to “yodel” it if that’s how your smtp works!
More: Jeremy, Simon, and Justin.
Several excellent comments on Jeremy’s site, including a link to Sender Policy Framework, a very similar technique already in use by the likes of AOL, Altavista and others. (I knew I’d seen idea this before!)