Defeating the Same Origin Policy part 2

    Date: 03/25/08 (Security)    Keywords: java

    In my first post in this series, I discussed the Same Origin Policy and how it protects us from some very serious attacks, the dangers of domain name based trust, and how to attack implementations of the Same Origin Policy within the Java Virtual Machine (JVM).  In order to demonstrate...

    Source: http://blogs.zdnet.com/security/?p=974

« What Microsoft can teach... || Security metrics and issues »


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home