![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Too lazy to set a custom title
Join Date: Aug 2001
Location: The Netherlands
Posts: 13,723
|
Look what I've made,,,,protect yourself....
Hi,
Look what I've made: http://www.justsexxx.com/cook.html click then on the link. The windows will show the cookie stored on your computer from google. I used the domain google, becasuse I presume that you've all been there once. Did it also with a passwork protected site, and I received the username and password, they we're protected, but you can encrypt that.... Let me know if your computer has the same problem.....(must have visited for this example google at least once since your last internetfiles cleanup) Andre |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Confirmed User
Join Date: Oct 2001
Location: The pay phone outside the 7-11
Posts: 357
|
Sure it works, but what's that supposed to prove? You are viewing the cookie information locally. No need to cause mass hysteria over a simple javascript. That cookie information can not be passed to a third party. Only the domain that set the cookie or you sitting at your machine can get the contents of that cookie.
------------------ Dot Matrix TGP System |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 | |
Confirmed User
Join Date: Mar 2001
Location: Principality of Sealand
Posts: 2,033
|
Quote:
umm actually it can... and very simple to do so.... |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 | |
Confirmed User
Join Date: Oct 2001
Location: The pay phone outside the 7-11
Posts: 357
|
Quote:
------------------ Dot Matrix TGP System |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
Too lazy to set a custom title
Join Date: Aug 2001
Location: The Netherlands
Posts: 13,723
|
Hi,
Actually you can read those cookies. You can let it send to an emailaddress and try to encrypt it,.So I can read your cookies.... Andre |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 | |
Confirmed User
Join Date: Oct 2001
Location: The pay phone outside the 7-11
Posts: 357
|
Quote:
------------------ Dot Matrix TGP System |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 | |
Confirmed User
Join Date: Aug 2001
Posts: 474
|
Quote:
Cookies are safe (on the discussed level at least). |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
So Fucking Banned
Join Date: Sep 2001
Location: shell beach
Posts: 7,938
|
... you won´t even notice when sending that email ... nasty things can be done with activeX exploits ...
------------------ Don't innovate - imitate! ... giving away mass traffic for free !! |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 |
I'm here for SPORT
Industry Role:
Join Date: Jul 2001
Location: Phone # (401) 285-0696
Posts: 41,470
|
I like cookies with milk
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 |
Confirmed User
Join Date: Jul 2001
Posts: 750
|
This is a bit of the latest Microsoft Security Bulletin. Received this yesterday.
From Microsoft Web sites use cookies as a way to store information on a user's local system. Most often, this information is used for customizing and retaining a site's setting for a user across multiple sessions. By design each site should maintain its own cookies on a user's machine and be able to access only those cookies. A vulnerability exists because it is possible to craft a URL that can allow sites to gain unauthorized access to user's cookies and potentially modify the values contained in them. Because some web sites store sensitive information in a user's cookies, it is also possible that personal information could be exposed. Risk Rating: ============ - Internet systems: High - Intranet systems: High - Client systems: High RD |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#11 |
Confirmed User
Join Date: Oct 2001
Location: The pay phone outside the 7-11
Posts: 357
|
Sorry, I disagree. If it can be done....SHOW ME! This is the same kind of paranoia that has been fueling the nightmares of AOL users for years.
I get the same bulletins too, but as long as you leave your default security settings alone and stay away from the script kiddies sites, you are pretty safe. In case anyone cares, the bulletin that we are speaking of is at http://www.microsoft.com/technet/tre...n/MS01-055.asp There are no known cases of anyone exploiting this issue, but it is possible (Linux anyone?). ------------------ Dot Matrix TGP System |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#12 |
Confirmed User
Join Date: Jul 2001
Posts: 750
|
I'm not all that worried about it myself personally, but it should be a concern. If it hasn't been done then I don't think MS would even know about it or hot it works exactly and be calling it a high risk.
Nothing surprises me anymore after seeing what all has been exploited through active x controls. Autobookmarking, adding things to your desktop and start menu. Not to mention all of these programs that can replace your text/links/banners with someone elses. If anyone would have said any of those things are something to be worried about before they became a major reality, most people would not have believed that either. I'm not a progammer, if it wasn't for Frontpage I would have to get a real job, but if there is a way to do it you can bet your last dollar that someone already knows how to do it or will soon enough. RD |
![]() |
![]() ![]() ![]() ![]() ![]() |