On Sat, 2003-09-20 at 07:53, HaywireMac wrote: > On Thu, 18 Sep 2003 01:41:09 -0700 > James Sparenberg <[EMAIL PROTECTED]> uttered: > > > > they're screwed anyway... > > > > > > http://www.wired.com/news/technology/0,1282,60473,00.html > > > > > > Muahahahahahahahahahaha! > > > > > > The Slashdot effect... :-D > > > > > > Can you say SWEEEEEEET! > > it gets better/worse: > > http://securityfocus.com/news/7009 > > Quote: > > "On Wednesday, Boston-based Internet security and privacy consultant > Richard Smith found buried in the SiteFinder page a so-called "Web bug," > an invisible image file delivering a cookie that doesn't expire for five > years. > > This certainly means the culling of some information, said Smith. > "They're getting a sense of what domain names are mistyped, and perhaps > this can be used by a domain name sales company. In addition, Overture > is a pay for click search engine, with questionable affiliates."
you did catch that the site is XSS vulnerable too, right? Look at the /. discussion thread. Caution advised for the easily offended though, one example adds "hi mom" and the other example adds the picture from goatse.cx :-/ -- Jack Coates Monkeynoodle: A Scientific Venture...
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com