lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040205223527.GA25159@php.net>
From: s.esser at e-matters.de (Stefan Esser)
Subject: Interesting side effect of the new IE patch

hmmm,

> They, fiat and others that used the M$ non-stanard as a basis upon which
> to build, deserve exactly what they decided to buty into and not really
> research. ... 

> No sympathy here,

I wonder why so many people are just blind of hatred when the topic is
Microsoft. It is not a secret that I dislike Microsoft, but I am not
blind of hatred like you obviously are. All standard browsers support
the http://username:password@... . THIS makes it a standard, no matter
what the bloody RFC writes. The majority of people liked adding
username:password to the URL, so it was implemented into all browsers
and became a standard. That the RFC was not updated is not the fault
of Microsoft. If the community had not accepted this as standard it
would not be in other browsers (like mozilla), too. 


Stefan

-- 

--------------------------------------------------------------------------
 Stefan Esser                                        s.esser@...atters.de
 e-matters Security                         http://security.e-matters.de/

 GPG-Key                gpg --keyserver pgp.mit.edu --recv-key 0xCF6CAE69 
 Key fingerprint       B418 B290 ACC0 C8E5 8292  8B72 D6B0 7704 CF6C AE69
--------------------------------------------------------------------------
 Did I help you? Consider a gift:            http://wishlist.suspekt.org/
--------------------------------------------------------------------------


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ