Charles is an easy program to test this. You can make custom responses 
to certain http requests. For testing you can easily setup a rule that 
will always return a <allow-access-from domain="*" /> at any http request.

I'm sure you would agree that security should always be on the server, 
and not on the client.

Evert

Mike Chambers wrote:
> Could you please explain this with an example? Crossdomain does not  
> exist to prevent DoS attacks.
>
> mike chambers
>
> [EMAIL PROTECTED]
>
> On Feb 2, 2006, at 8:17 AM, Evert | Collab wrote:
>
>   
>> It's merely prevents 'the regular
>> user' from consuming other people's services, but I doesn't stop a
>> malicious user.
>>     
>
>
> _______________________________________________
> osflash mailing list
> osflash@osflash.org
> http://osflash.org/mailman/listinfo/osflash_osflash.org
>
>   


_______________________________________________
osflash mailing list
osflash@osflash.org
http://osflash.org/mailman/listinfo/osflash_osflash.org

Reply via email to