Third party accessories are a big part of many blogs.
As Blogger proceeds to command a larger and larger share of the free online web site market, they encourage (directly or indirectly) the development of third party templates, and accessories. This lets us make our blogs more personal to our desires, and shinier to our egos.
Layouts Blogger is more mature, and commands an ever growing share of Blogger. And so, the the selection of Layouts compatible templates and accessories, again provided by third parties, will grow.
And as the selection grows, so does the possible risk, from installing what's available on our blogs. As I wrote long ago, what better way to hack somebody's blog (or computer) than by conning the victim into installing the hack, on his own?
As we install third party accessories, we need to remain aware of the risks involved, in using non Blogger components.
Consider the last possibility carefully. It's one thing to unintentionally download and install a hack on your own computer - it's another thing to intentionally install the hack onto your blog, and then onto your readers computers.
Properly designed, a blog installed hack has to only contain code linking the blog to a web site where malware is distributed. Not all malware scanners, either installed on the computer or run from a web site, will detect the blog based component that merely redirects the victim to a malicious web site.
However, we are currently seeing reports of some malware scanners which do validate, on a page by page basis, against all links on the page.
Spread malware onto your computer, and you answer only to yourself. Help spread malware onto your readers computers, and you won't even know all of the people to whom you should answer.
In some cases, your readers won't know that you were the one who contributed to their problems - but you'll still be responsible. Your readers may not blame you for their troubles - but your blog will still suffer from less activity, because your readers are busy carrying their computers to the nearest tech shoppe, and paying for malware removal services, instead of reading your posts.
And should you choose to install a third party accessory or template on your blog, make sure that it's properly chosen and installed. And carefully control the install process.
And finally, keep track of what you install, after it's been installed and tested. Some accessories will work fine immediately when installed, and will fail later - giving your readers unwanted content, when they try to read your blog.
As Blogger proceeds to command a larger and larger share of the free online web site market, they encourage (directly or indirectly) the development of third party templates, and accessories. This lets us make our blogs more personal to our desires, and shinier to our egos.
Layouts Blogger is more mature, and commands an ever growing share of Blogger. And so, the the selection of Layouts compatible templates and accessories, again provided by third parties, will grow.
And as the selection grows, so does the possible risk, from installing what's available on our blogs. As I wrote long ago, what better way to hack somebody's blog (or computer) than by conning the victim into installing the hack, on his own?
As we install third party accessories, we need to remain aware of the risks involved, in using non Blogger components.
- Some accessories may not work as well as Blogger developed and certified products.
- All accessories may not work together, if developed by different third parties.
- Some accessories may not work at all.
- Some accessories, maliciously crafted, may work as designed - but their design may not be to our benefit.
- Some accessories, maliciously crafted, may attack the computers of our readers. What better way to acquire new victims en masse, than to con a third party into distributing malware without realising it?
Consider the last possibility carefully. It's one thing to unintentionally download and install a hack on your own computer - it's another thing to intentionally install the hack onto your blog, and then onto your readers computers.
Properly designed, a blog installed hack has to only contain code linking the blog to a web site where malware is distributed. Not all malware scanners, either installed on the computer or run from a web site, will detect the blog based component that merely redirects the victim to a malicious web site.
However, we are currently seeing reports of some malware scanners which do validate, on a page by page basis, against all links on the page.
Spread malware onto your computer, and you answer only to yourself. Help spread malware onto your readers computers, and you won't even know all of the people to whom you should answer.
In some cases, your readers won't know that you were the one who contributed to their problems - but you'll still be responsible. Your readers may not blame you for their troubles - but your blog will still suffer from less activity, because your readers are busy carrying their computers to the nearest tech shoppe, and paying for malware removal services, instead of reading your posts.
And should you choose to install a third party accessory or template on your blog, make sure that it's properly chosen and installed. And carefully control the install process.
And finally, keep track of what you install, after it's been installed and tested. Some accessories will work fine immediately when installed, and will fail later - giving your readers unwanted content, when they try to read your blog.
Comments