One thing about producing the volume of content that we here on DevCentral do, sometimes a great article that is really to the point and relevant to you all gets lost in the shuffle.

A few weeks ago I was running statistics on our articles so we could all talk about what works and what doesn't, what we could do better and what we've got covered, what topic areas are well served and what aren't. Standard stuff in reviewing how well a publication is working.

During the process of gathering statistics, I noticed one of those great articles that got lost in the shuffle. Since I have a blog, I thought I'd point out Colin's PDF Vulnerability article. While it's a year old, it is a great example of the power of iRules - and it could be extended to work on other problems. With one short iRule, Colin shows you how to block a PDF vulnerability from being distributed by your servers. Powerful stuff that, by extension and with a bit of elbow grease can be used on other static file-level vulnerabilities.

PDF files are one of those things that everyone uses and we all assume are "safe", and indeed they are - the number of successful hacks of PDF are infinitesimal considering we've all got Acrobat Reader on our systems. So when this hack broke it was big news, and Colin was immediately out there with this fix.

So take a look, think about how this applies to you and what it might mean for the likes of the never-ending stream of WMF/EMF hacks that are out there (unless you're moving to an all-Vista environment), and how it could be expanded in other ways to protect your users from malicious content on your servers.

Do the possible. Improvise. Make the impossible seem possible.

/imbibing: Mt. Dew

/reading: All the Hippos Go Berserk (thanks Jeff!), did I mention we have a small child?