NFN Smith wrote on 9/02/2020 5:26 AM:
<Snip>
One other place that I make occasional use of browser spoofing is if I'm
testing access filters on the web page I maintain. There's a lot of
forged stuff that's from botnet access, and by temporarily showing a bad
UA that I recognize from the logs, I can verify if my filters are
correctly rejecting access that shows that particular UA. One that I've
seen a lot of over the last couple of years is accesses that claim to be
"Firefox 40.1" (a version of Firefox that was never valid), and setting
Seamonkey to show that one allowed me verify that the web site is
rejecting those accesses.
Although the most common reason for spoofing (especially by a Seamonkey
user) would be to get around sites that are demanding current versions
of Firefox, there's other useful things that you can do with spoofing.
Smith
Whilst reading your post, I was wondering "What would happen if someone
were to use a UA string something like 'FF 99.60.1' or 'SM 99.53.1'"
O.K., maybe the '99' might be a little far fetched, but, rather then
spoofing the newest version UA or a near future UA, spoof a far future
UA and see if it would (always) be 'acceptable'!!
--
Daniel
Win7 User agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0)
Gecko/20100101 SeaMonkey/2.49.5 Build identifier: 20190609032134
Linux User agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0)
Gecko/20100101 SeaMonkey/2.49.1 Build identifier: 20171015235623
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey