![]() |
Look what I've made,,,,protect yourself....
Hi,
Look what I've made: http://www.justsexxx.com/cook.html click then on the link. The windows will show the cookie stored on your computer from google. I used the domain google, becasuse I presume that you've all been there once. Did it also with a passwork protected site, and I received the username and password, they we're protected, but you can encrypt that.... Let me know if your computer has the same problem.....(must have visited for this example google at least once since your last internetfiles cleanup) Andre |
Sure it works, but what's that supposed to prove? You are viewing the cookie information locally. No need to cause mass hysteria over a simple javascript. That cookie information can not be passed to a third party. Only the domain that set the cookie or you sitting at your machine can get the contents of that cookie.
------------------ Dot Matrix TGP System |
Quote:
umm actually it can... and very simple to do so.... |
Quote:
------------------ Dot Matrix TGP System |
Hi,
Actually you can read those cookies. You can let it send to an emailaddress and try to encrypt it,.So I can read your cookies.... Andre |
Quote:
------------------ Dot Matrix TGP System |
Quote:
Cookies are safe (on the discussed level at least). |
... you won´t even notice when sending that email ... nasty things can be done with activeX exploits ...
------------------ Don't innovate - imitate! ... giving away mass traffic for free !! |
I like cookies with milk
|
This is a bit of the latest Microsoft Security Bulletin. Received this yesterday.
From Microsoft Web sites use cookies as a way to store information on a user's local system. Most often, this information is used for customizing and retaining a site's setting for a user across multiple sessions. By design each site should maintain its own cookies on a user's machine and be able to access only those cookies. A vulnerability exists because it is possible to craft a URL that can allow sites to gain unauthorized access to user's cookies and potentially modify the values contained in them. Because some web sites store sensitive information in a user's cookies, it is also possible that personal information could be exposed. Risk Rating: ============ - Internet systems: High - Intranet systems: High - Client systems: High RD |
Sorry, I disagree. If it can be done....SHOW ME! This is the same kind of paranoia that has been fueling the nightmares of AOL users for years.
I get the same bulletins too, but as long as you leave your default security settings alone and stay away from the script kiddies sites, you are pretty safe. In case anyone cares, the bulletin that we are speaking of is at http://www.microsoft.com/technet/tre...n/MS01-055.asp There are no known cases of anyone exploiting this issue, but it is possible (Linux anyone?). ------------------ Dot Matrix TGP System |
I'm not all that worried about it myself personally, but it should be a concern. If it hasn't been done then I don't think MS would even know about it or hot it works exactly and be calling it a high risk.
Nothing surprises me anymore after seeing what all has been exploited through active x controls. Autobookmarking, adding things to your desktop and start menu. Not to mention all of these programs that can replace your text/links/banners with someone elses. If anyone would have said any of those things are something to be worried about before they became a major reality, most people would not have believed that either. I'm not a progammer, if it wasn't for Frontpage I would have to get a real job, but if there is a way to do it you can bet your last dollar that someone already knows how to do it or will soon enough. RD |
All times are GMT -7. The time now is 01:47 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123