Team,
I understand we Information security professionals scans the application but
may not recommend few already known best in-class steps as remediations for
well-known vulnerabilities. Lets discuss all such terminology starting with
Same Origin and Cross Domain policies. You all can extend with all know
terminologies:

Visit the below link for detailed information on Same Origin methods....
http://en.wikipedia.org/wiki/Same_origin_policy

Visit the below link for detailed information on Cross Domain methods....
http://msdn.microsoft.com/en-us/library/cc709423(VS.85).aspx

I believe this will be helpful for all... Thanks!


Regards
Sandeep Thakur

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to