lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 1 Aug 2012 09:05:31 -0400
From: Adam Caudill <adam@...mcaudill.com>
To: Christian Sciberras <uuf6429@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: sandboxed browsing
+1 for wget - that's about the only "safe" option. That way there's no JS
execution / rendering, so little to worry about.
On Aug 1, 2012 7:00 AM, "Christian Sciberras" <uuf6429@...il.com> wrote:
> I use Internet Explorer 6 on Windows XP, obviously!
>
>
> On a more serious note, I doubt there's a safer alternative,
> except maybe not going there in the first place (or just wget-ing it
> instead).
>
>
>
>
>
>
>
> On Wed, Aug 1, 2012 at 1:38 AM, Kyle Creyts <kyle.creyts@...il.com> wrote:
>
>> Who uses something other than a browser in a virtual machine to follow
>> suspicious/possibly malicious links?
>>
>> If you do, what do you use, and how did you choose it?
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists