On Sat, 2003-09-20 at 07:53, HaywireMac wrote:
> On Thu, 18 Sep 2003 01:41:09 -0700
> James Sparenberg <[EMAIL PROTECTED]> uttered:
> 
> > > they're screwed anyway...
> > > 
> > > http://www.wired.com/news/technology/0,1282,60473,00.html
> > > 
> > > Muahahahahahahahahahaha!
> > > 
> > > The Slashdot effect... :-D
> > 
> > 
> > Can you say SWEEEEEEET!
> 
> it gets better/worse:
> 
> http://securityfocus.com/news/7009
> 
> Quote:
> 
> "On Wednesday, Boston-based Internet security and privacy consultant
> Richard Smith found buried in the SiteFinder page a so-called "Web bug,"
> an invisible image file delivering a cookie that doesn't expire for five
> years.
> 
> This certainly means the culling of some information, said Smith.
> "They're getting a sense of what domain names are mistyped, and perhaps
> this can be used by a domain name sales company. In addition, Overture
> is a pay for click search engine, with questionable affiliates." 

you did catch that the site is XSS vulnerable too, right? Look at the /.
discussion thread. Caution advised for the easily offended though, one
example adds "hi mom" and the other example adds the picture from
goatse.cx :-/

-- 
Jack Coates
Monkeynoodle: A Scientific Venture...


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to