Browser Security Pack
|
Jul. 02, 2004, 02:38 AM
Post: #16
|
|||
|
|||
besafe Wrote:Glad I downloaded it earlier. I can't d/l it now.GOOD!!! See! It's not JUST ME!!! |
|||
Jul. 02, 2004, 02:44 AM
Post: #17
|
|||
|
|||
ProxRocks Wrote:Shea,I meant that you can sift through the code (PHP) and find the error that your getting. Then you can trace it back and see why it's giving you that error. If you don't want to then fine, it was just a suggestion. ..::besafe::.. When you say 'I can't d/l it', does that mean that your getting the same error as ProxsRocks or your just unable to download it? �{=(~�::[Shea]::��~)=}� How 'bout you sideburns, you want some of this milk? This fading text is pretty cool, eh? I bet you wish you had some. |
|||
Jul. 02, 2004, 02:50 AM
Post: #18
|
|||
|
|||
Shea,
I'd do that if I knew a dime about PHP - but I don't... Nor care to, for that matter... |
|||
Jul. 02, 2004, 05:46 AM
Post: #19
|
|||
|
|||
Fixed Link
|
|||
Jul. 02, 2004, 08:10 AM
Post: #20
|
|||
|
|||
Kye-U Wrote:Fixed LinkSays you!!! I STILL get AUTHORIZATION MISMATCH!!! |
|||
Jul. 02, 2004, 11:20 AM
Post: #21
|
|||
|
|||
COMPLETELY hit-or-miss...
I *finally* got the thing to download... I didn't change ANYTHING on my end... edit: and glad I did, this thing looks impressive... thanks Kye-U... |
|||
Jul. 02, 2004, 12:37 PM
Post: #22
|
|||
|
|||
ProxRocks , try putting this site in your trusted zone and see if it works . Just a suggestion . If you wish , remove it later . Also , I think you have the filter to remove the top logo on the page ; I bet that's what is doing it . Have a great day , Ralph
|
|||
Jul. 02, 2004, 01:10 PM
Post: #23
|
|||
|
|||
I do have a filter to "reclaim" the top 2 1/2 inches of real estate, yes...
But I was in BYPASS mode (to the point of removing the localhost http settings) with a cleared cache and a complete reboot - and got nowhere with the download... The next time this nuisance rears its ugly rear, I'll test the trusted zone suggestion... |
|||
Jul. 02, 2004, 08:56 PM
Post: #24
|
|||
|
|||
"Sorry, an error occurred. If you are unsure on how to use a feature, or don't know why you got this error message, try looking through the help files for more information.
The error returned was: Sorry, but this function isn't available to guests." That's the message I got.Evidently,I am logged in.Just gives me something to look forward to.No worries. ????,??,????`????,? _J_G_ ????,??,????`????,? |
|||
Jul. 02, 2004, 09:03 PM
Post: #25
|
|||
|
|||
Jul. 02, 2004, 10:03 PM
Post: #26
|
|||
|
|||
Thanks,Kye-U.That did the trick.
Wonder if it had anything to do with the streaming security patch D/L from M$,earlier? D/L'd fine in Firefox. ????,??,????`????,? _J_G_ ????,??,????`????,? |
|||
Jul. 03, 2004, 07:38 PM
Post: #27
|
|||
|
|||
Bravo!..Splendid work,Kye-U.
(Image is just documentary proof of what happened at the Secunia site.They warned that ALL browsers are vulnerable due to an inherent design flaw.Advised everyone to run this simple online test based on the infamous Ject exploit.) A million thanks for all your work. Mmm..just tried to check the file myself,and got the same error when attempting to D/L it.Guess you'd have to write even more filters to strip out every enthusiastic screenshot.. ????,??,????`????,? _J_G_ ????,??,????`????,? |
|||
Jul. 04, 2004, 04:39 AM
Post: #28
|
|||
|
|||
I've updated the Pack once again, but with a bunch of new filters.
Also, a miscellaneous part of a certain readme: Quote:+----------------------------------------------- Turns out I entered 2 options... I've fixed it now, and I tested it with an Account with Member Permissions. Works! ProxRocks, Jaded_Goth, please post your findings |
|||
Jul. 04, 2004, 10:38 AM
Post: #29
|
|||
|
|||
I would like more information about those filters and the exploits which they prevent. Where would I get that? For instance, what is an absolute css bug, or the classic folder view exploit? Why is the "Cross-Domain Policy Exploit" filter so named? The match seems to me to be looking for attempts to access local drives. Why is the "Cross Site Exploit" not named the "Cross Site Cookie Exploit"? What does the 0-width GIF exploit do to Mozilla? I have seen web bugs with dimensions set to 0. My web bug filter takes care of those by substituting a local file for the original.
|
|||
Jul. 04, 2004, 10:51 AM
Post: #30
|
|||
|
|||
A majority of these Exploits were taken from http://secunia.com/product/11/ and http://www.wilderssecurity.com/showthread.php?t=11975
You can find more information on the vulnerabilities/exploits. I'm sorry about the lack of documentation I will include this information. |
|||
« Next Oldest | Next Newest »
|