James Young wrote: > #3 is currently my favorite. It blocks a class of attacks from anywhere. > Unfortunately, it could break some valid scripts: I do not know. Also, you won't be able to trap POST exploits using this method. --- Henrik Nordstrom Spare time Squid hacker
- proxying exploit attempts James Young
- Re: proxying exploit attempts Henrik Nordstrom
- Re: proxying exploit attempts James Young
- Re: proxying exploit attempts Andrew Daviel
- Re: proxying exploit attempts Henrik Nordstrom
- Re: proxying exploit attempts James Young
- RE: proxying exploit attempts Sparks, Alan
