Team, I understand we Information security professionals scans the application but may not recommend few already known best in-class steps as remediations for well-known vulnerabilities. Lets discuss all such terminology starting with Same Origin and Cross Domain policies. You all can extend with all know terminologies:
Visit the below link for detailed information on Same Origin methods.... http://en.wikipedia.org/wiki/Same_origin_policy Visit the below link for detailed information on Cross Domain methods.... http://msdn.microsoft.com/en-us/library/cc709423(VS.85).aspx I believe this will be helpful for all... Thanks! Regards Sandeep Thakur -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
