Charles is an easy program to test this. You can make custom responses to certain http requests. For testing you can easily setup a rule that will always return a <allow-access-from domain="*" /> at any http request.
I'm sure you would agree that security should always be on the server, and not on the client. Evert Mike Chambers wrote: > Could you please explain this with an example? Crossdomain does not > exist to prevent DoS attacks. > > mike chambers > > [EMAIL PROTECTED] > > On Feb 2, 2006, at 8:17 AM, Evert | Collab wrote: > > >> It's merely prevents 'the regular >> user' from consuming other people's services, but I doesn't stop a >> malicious user. >> > > > _______________________________________________ > osflash mailing list > osflash@osflash.org > http://osflash.org/mailman/listinfo/osflash_osflash.org > > _______________________________________________ osflash mailing list osflash@osflash.org http://osflash.org/mailman/listinfo/osflash_osflash.org