lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200301301945.h0UJjgrH067356@mailserver4.hushmail.com> From: xss-is-lame at hushmail.com (xss-is-lame@...hmail.com) Subject: Question about the new Xupiter toolbar -----BEGIN PGP SIGNED MESSAGE----- Maybe it uses cross-site tracing. I hear that it's really dangerous. XiL xss-is-lame@...hmail.com > Has anyone looked into this new Xupiter toolbar to see how it is being > installed on people's computer? In particular is it using some IE > security hole for the install or does it just use the standard ActiveX > drive-by download mechanism? -----BEGIN PGP SIGNATURE----- Version: Hush 2.2 (Java) Note: This signature can be verified at https://www.hushtools.com/verify wmAEARECACAFAj44P5kZHHhzcy1pcy1sYW1lQGh1c2htYWlsLmNvbQAKCRDs/5lboNFb hr8BAJ99LC++ZhuQT7S/Y/+yVXFv+U2PqQCgglbkXYlfI4SWrDviVb+HOwK7ayk= =fz+o -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Big $$$ to be made with the HushMail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427