James A. Donald wrote:
| Adversary accesses web site as if about to log in, gets
| a session ID. Then supplies false information to
| someone else's browser, causes that browser on some one
| else's computer to use that session ID. Someone else
| logs in with hacker's session ID, and now the
--
James A. Donald wrote:
Adversary accesses web site as if about to log in,
gets a session ID. Then supplies false information
to someone else's browser, causes that browser on
some one else's computer to use that session ID.
Someone else logs in with hacker's session ID, and