Je hebt een klacht over de onderstaande posting:
En drie keer raden wat de volgende exploit wordt voor meer M$-Trustworthy-Ellende ? "We can generally guess what is going on here. As .hta or "HTML Application" files are not binary and resemble - mechanically - HTML files, IE's check of content will be unable to return that this file is anything but safe. The second check of MIME type will see that we are requesting a safe file type... and the third check of MIME type will be from the server saying this is a HTML Application. For whatever reason, IE has ignored the returned MIME type from a security context, but paid attention to it from an execution context. This attack was discovered through manual testing techniques. The hypothesis was: "Internet Explorer has many avenues where it might be presented with executable content. One of these avenues must be broken so that executable content might be automatically run." Bedenk dan even welk percentage van de gemiddelde thuisluser patched.. Tel 1 en 1 bij elkaar op..
Beschrijf je klacht (Optioneel):