{"id":580,"date":"2001-11-14T06:17:02","date_gmt":"2001-11-14T00:47:02","guid":{"rendered":"http:\/\/madmanweb.com\/2001\/11\/14\/interface_criti\/"},"modified":"2001-11-14T06:17:02","modified_gmt":"2001-11-14T00:47:02","slug":"interface_criti","status":"publish","type":"post","link":"https:\/\/madmanweb.com\/2001\/11\/interface_criti\/","title":{"rendered":"Interface critique #1"},"content":{"rendered":"
\n
I’ve noticed that Brian Hayes hasn’t updated his interface halls of fame<\/A> and shame<\/A> since June 2000. So I guess I better post my interface examples right here. <\/P> Today’s post shows three interface designs (technically, it’s actually software design). Two are something that Microsoft could have implemented years ago and saved not only a lot of grief to its customers, but also a loss of face. The other example is something that’s not talked about much but is annoying enough.<\/P><\/p>\n Example #1<\/B><\/P> I use Eudora as my mail client. I’ve used it since 1994 and consider it much better than Outlook\/Outlook Express (try sending an earlier message to another recipient in Outlook without using the “Forward” option.). The best reason to use it, however, is that it has no scripting holes waiting to be exploited. For example, while it allows Javascript, VBScript, and Java to be embedded in email messages, it wisely leaves them turned off by default, as you can see from the following screenshot:<\/P> <\/P> Microsoft’s usual contention is “the users need it”. I’ll accept that argument at face value. Just leave the damned thing turned off by default. The 2% of users who do<\/I> need it can turn it on in their mail clients. In fact, many of Microsoft’s security holes are because everything is turned on by default. Sigh<\/EM><\/P> Let’s say you left the scripting on in Eudora. All is not lost. Your PC doesn’t suddenly become a virus-spreading machine. That’s because when some rogue program tries to send mail without you knowing about it, Eudora pops up this warning:<\/P> <\/P> <\/P> While a little verbose, the dialog box tells you in no uncertain terms what the danger is. It tells you that there could be a virus on your system. Now, you probably know that most people just press “Yes” or “OK” without reading the stuff in a dialog box. That’s why this is so brilliant. It doesn’t ask you, “Do you want to send the message?” and thereby risk spreading the virus. It asks you if you want to see<\/I> the message. Even if you hit Enter without really looking at it, you don’t screw your system. I love<\/I> it!<\/P>
\n
\n
\n
\n
\n
Notice how the “Allow executables in HTML content” option is unchecked by default? That’s the way it should be. <\/P>
\n
\n
Example #2<\/B><\/P>
\n
\n
\n
\n
\n