James Young wrote:


> #3 is currently my favorite.  It blocks a class of attacks from anywhere.
> Unfortunately, it could break some valid scripts: I do not know.

Also, you won't be able to trap POST exploits using this method.

---
Henrik Nordstrom
Spare time Squid hacker

Reply via email to