| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Locking Windows |
G'day Bob 18 Apr 04 22:06, Bob Lawrence wrote to John Tserkezis: BL> I know what a *real* cookie does... what worries me is what a virus BL> masquerading as a cookie *might* do. The sender is able to download a BL> file into a known area on your hard drive, and access it later. BL> Jeeze! Doesn't that worry you? Not at all. The "sender" requests your browser to store some data, or asks your browser to retrieve and return that data. The sender has no control over the storage method, or location of the data. [...] BL> Okay. How about I'm a respected site (like Borland), and I send you BL> a trojan cookie. And then I decide that it's time to wipe all the BL> Borland free programs past their use-by (because some bastard has BL> cracked the codes). Now, when you update I activate my "cookie" and BL> wipe your hard drive of the pirated software. Is that enough specific BL> "somethign else" for you? How would you "activate" this cookie if I'm not using your vesion of a browser? Regards, David --- Msged/LNX TE 06 (pre)* Origin: Godzone, Oz. (3:640/305) SEEN-BY: 633/104 260 262 267 270 285 640/296 305 384 531 954 690/734 712/848 SEEN-BY: 774/605 800/221 445 @PATH: 640/305 954 633/260 267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.