lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040720082232.96291.qmail@web52606.mail.yahoo.com>
From: xillwillx at yahoo.com (Will Image)
Subject: IE

never said i felt any safer, im just saying its one
more step towards security .. of security by
obsecurity has always been the prefered method ... 


--- nicolas vigier <boklm@...s-attacks.org> wrote:
> On Sun, 18 Jul 2004, Ill will wrote:
> 
> > "user-agent contains very little _sensitive_ info"
> > 
> > user agents could be used for exploits.. like
> redirecting the browser
> > to whatever exploit page  by the definition of
> what browser is
> > connecting to it etc.. so it would be a  good idea
> for some people to
> > conseal what type of browser is defined in the
> headers
> 
> And you can feel safe with that ? Someone can put an
> exploit on a page
> without checking your browser before.
> The real solution is to use a browser with no known
> vulnerability (and
> that's better if it didn't have a lot in the past),
> not to try to hide


> what you are using.
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
> http://lists.netsys.com/full-disclosure-charter.html
> 



		
__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ