View Single Post
Unread 30 Dec 2005, 02:24   #25
Leshy
Mr. Blobby
 
Leshy's Avatar
 
Join Date: Nov 2000
Location: Belgium
Posts: 8,271
Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.Leshy has ascended to a higher existance and no longer needs rep points to prove the size of his e-penis.
Re: dont go opening them thar .wmf files now...

Quote:
Originally Posted by Flavius
had you said "dont use windows ME, 2000, XP or 2003" I would have agreed but unfortunately it is not the browser that is vulnerable, but the image previewing, which is also used by any other browser (opera, firefox). even google desktop search uses the preview to cache the pictures, so that makes you vulnerable as well.
The main issue, however, is that at least Opera and Firefox ask you whether you wish to open the file, whereas Internet Explorer simply does so.

While this doesn't make Firefox or Opera immune or immensely more safe, it does show that in situations like these they provide an extra layer of security that Internet Explorer does not. And with the main source of security still being the end user, that is not a layer that should be easily overlooked.
__________________
http://www.leshy.net
Leshy is offline   Reply With Quote