Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl: the Markov chain saw
 
PerlMonks  

Re: Re: Hacking "explained"

by Dog and Pony (Priest)
on Oct 22, 2002 at 13:41 UTC ( [id://207071]=note: print w/replies, xml ) Need Help??


in reply to Re: Hacking "explained"
in thread Filtering potentially dangerous URI schemas in <a href="...">

Funny, I mentioned exactly that example when post-discussing with hackmare. :) Mix the User-Agent with the pw before encrypting and the attacker must use or simulate the exact same browser. Just obscurity, yes, but better than nothing. :)

Using IP, as some would suggest, is generally a bad method, as it changes (sometimes every request) for lots of people.


You have moved into a dark place.
It is pitch black. You are likely to be eaten by a grue.

Replies are listed 'Best First'.
Re^3: Hacking "explained"
by Aristotle (Chancellor) on Oct 22, 2002 at 15:24 UTC
    Yep. In fact, using the IP is even worse when you count in things like proxies (which may be transparent ones to complicate matters further). There are millions of reasons you don't want to be using the IP.

    Makeshifts last the longest.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://207071]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others pondering the Monastery: (5)
As of 2024-03-19 08:20 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found