On 17-Apr-2002 Ed Grimm wrote: > On Mon, 15 Apr 2002, Wim Kerkhoff wrote: > >> In a nutshell, create a hidden layer. In that hidden layer, do a >> GET/POST to a embperl/mod_perl page. The request will get sent to the >> hidden in-memory document, which can then be parsed back into javascript >> variables. > > That's a security hole! I do *not* want my browser running javascript > code that opens connections that I am not aware of. That being said, > I've long held the opinion that javascript is a security hole, and > typically review all javascript on a site before allowing my browser to > run it. Yes, I have found sites that do nasty stuff I don't want them > doing, and so gone elsewhere.
Oh, you're one of the people who turns images off by default, and only shows images that are definetly not web bugs? Aren't javascript security issues most common with Internet Exploder? Regards, Wim Kerkhoff -|- www.nyetwork.org -|- [EMAIL PROTECTED] --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
