Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]RE: tlug: Cache cow security hole
- To: tlug@example.com
- Subject: RE: tlug: Cache cow security hole
- From: Jim Schweizer <schweiz@example.com>
- Date: Wed, 30 Sep 1998 23:03:21 +0900 (JST)
- Content-Transfer-Encoding: 8bit
- Content-Type: text/plain; charset=us-ascii
- In-Reply-To: <Pine.LNX.3.96LJ1.1b7.980930211026.10709A-100000@example.com>
- Reply-To: tlug@example.com
- Sender: owner-tlug@example.com
Hi, On 30-Sep-98 Jonathan Byrne wrote: > Here's a site everybody should check out, if they haven't already seen it. > It is possible to suck out all of Netscape's cached information, including > credit card numbers (yup, it saves those!) without your knowing it. Any webmaster still using GET for forms transmission 'gets' what he deserves: <-- Subject: Re: New JavaScript Privacy Bug Found, Part 2 Newsgroups: comp.lang.javascript,comp.infosystems.www.browsers.misc,comp.infosystems.www.bro wsers.ms-windows,comp.infosystems.www.browsers.x,comp.security.misc Followup-To: comp.lang.javascript,comp.infosystems.www.browsers.misc,comp.infosystems.www.bro wsers.ms-windows,comp.infosystems.www.browsers.x,comp.security.misc The contents of forms you have submitted via the GET method are available to anyone running an exploit program, since the submitted data is part of the URL string. --> A simple solution is to disable JavaScript when you don't need it. It's too bad, I like many of the things JavaScript can do, but I find myself serfing more and more with it disabled - too many pop-up menus, jerk webmasters who try to redirect you with onUnload(), etc. Another useful item is a shell script that removes the ~/.netscape/cache/* and ~/.netscape/archive/* whenever you run it. (email me if you need one) Thanks, Jim S. --------------------------------------------------------------- Next Meeting: 10 October, 12:30 Tokyo Station Yaesu central gate Featuring the IMASY Eng. Team on "IPv6 - The Next Generation IP" Next Nomikai: 20 November, 19:30 Tengu TokyoEkiMae 03-3275-3691 --------------------------------------------------------------- Sponsor: PHT, makers of TurboLinux http://www.pht.co.jp
- References:
- tlug: Cache cow security hole
- From: Jonathan Byrne <jq@example.com>
Home | Main Index | Thread Index
- Prev by Date: Re: tlug: Linux for the masses: a civil reply, I hope.
- Next by Date: Re: tlug: Odd little e-mail problem
- Prev by thread: Re: tlug: Cache cow security hole
- Next by thread: tlug: Linux for the masses: a civil reply, I hope.
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links