On Jun 9, 2006, at 8:49 PM, Gregory Woodhouse wrote:
.asp indicates to the Web server that the document has code to be executed, usually _vbscript_. No database is implied or need be involved at all. Much of the Web malware has been code known to cause memory overflows in IE or IIS, giving the hackers an "in". |
_______________________________________________ Hardhats-members mailing list Hardhats-members@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/hardhats-members