| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Browser Security |
From: "John Beamish"
So running a browser in a VM is not a fully secured environment.
I asked the question because Joe and Josephine Sixpack may no longer be
part of a botnet but they will still hand over the keys to the family
wealth if they use a credit card.
On Wed, 25 Oct 2006 06:10:03 -0400, Geo wrote:
> "John Beamish" wrote in message
> news:op.thx7ioymm6tn4t{at}dellblack.wlfdle.phub.net.cable.rogers.com...
>> Would it be possible to visit a "poison" site that
causes a keystroke
>> logger (in, say, a hidden frame or some such) to trap and transmit back
>> to
>> "home base"?
>
> Typically that's what cross site scripting exploits are. It looks like
> the
> real site but it's not, may even pass you on to the real site after you
> enter your login info.
>
> Geo.
>
>
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.