Rip Toren wrote: > The connection goes either to the outside world, or localhost. How about > a security popup (and associated preference settings (allow, question, > deny)) concerning connection to the local host (localhost, > 127.0.0.1,myIP,etc). Then the user would be in some control when a page > attempted to use the somewhat priveleged state of having the socketpeer > being the local host. > The exploit doesn't necessarily involve localhost - the attacker could be trying to connect to some other machine, perhaps behind the user's firewall. -Mitch
- Re: More top-secret BS co... Clarence (Andreas M. Schneider)
- Re: More top-secret ... Rip Toren
- Re: More top-sec... Stuart Ballard
- Re: More top-sec... Stuart Ballard
- Re: More top-sec... Jeffrey W. Baker
- Re: More top-sec... JTK
- Re: More top-sec... hume . spamfilter
- Re: More top-sec... Adam James Fitzpatrick
- Re: More top-sec... Rip Toren
- Re: More top-sec... Clarence (Andreas M. Schneider)
- Re: More top-sec... Mitchell Stoltz
- Re: More top-secret ... Jay Garcia
- Re: More top-sec... Clarence (Andreas M. Schneider)
- Re: More top-secret BS commits with hidden... David Hallowell
- Re: More top-secret BS commits with h... Gervase Markham
- Re: More top-secret BS commits with hidden... Gervase Markham
