Assume that *ANYTHING* coming from the browser (or something pretending to be a browser) can be hacked...

/John

William M Conlon wrote:
Actually, you need to assume that all input can be hacked, at least someone will try to put arbitrary data into your arguments, poster or search/ hidden or visible.

And assume that cookies can be hacked.


On Sep 12, 2006, at 4:51 PM, quicknote wrote:

I have made a couple of assumptions that might or might not be correct?
 A hacker would have a hard time getting access to a 'hidden post arg'
A hacker would have a hard time hacking into a report if the URL is limited
to "xwww.root/contact.taf?"

Bill

William M. Conlon, P.E., Ph.D.
To the Point
345 California Avenue Suite 2
Palo Alto, CA 94306
   vox:  650.327.2175 (direct)
   fax:  650.329.8335
mobile:  650.906.9929
e-mail:  mailto:[EMAIL PROTECTED]
   web:  http://www.tothept.com

________________________________________________________________________
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


--


John McGowan
[EMAIL PROTECTED]
P 847.608.6900 x 110
F 847.608.9501

________________________________________________________________________
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

Reply via email to