To: kezekiel
Ran it with Firefox 1.0... and passed. My version 0.8 Firefox passed as well. You wanna knnow why folks?
Firefox has an extension available called PrefButtons 0.2.
This allows you to place a small check box on you tool bar that you can easily turn of Java scripting with. Uncheck the box and run the test and Secunia can't do bupkis!
Firefox still beats the crap out of everything else.
18 posted on
12/08/2004 8:52:10 PM PST by
Bloody Sam Roberts
(All I ask from livin' is to have no chains on me. All I ask from dyin' is to go naturally.)
To: Bloody Sam Roberts
Tried it with Avant too. Works great!
21 posted on
12/08/2004 8:54:17 PM PST by
Never2baCrat
(I used to be modest, now I'm perfect!)
To: Bloody Sam Roberts
This is more subtle than that.
The lack of consistency among different Firefox users caused me to go to the Slashdot thread for more discussion.
Apparently the function of the vulnerability has to do with the exact sequence of types of windows that are opened, i.e. existing, tabbed, background, etc.
After failing the test a few minutes ago my Firefox now passes, without changing any settings.
So some people who think their bowser is invulnerable may be in for a shock when the vulnerability pops up someday.
23 posted on
12/08/2004 8:56:26 PM PST by
steve86
To: Bloody Sam Roberts
So this is a Java script buggy thing that will allow a new web page to attempt to gain control of my computer if I have another tab (or browser) that is open on a secure site?
35 posted on
12/08/2004 9:07:41 PM PST by
Delta 21
(MKC USCG -ret)
To: dd5339
Ping to check the home PC's tonight.
Semper Fi
89 posted on
12/09/2004 7:25:36 AM PST by
dd5339
(A sheepdog, a warrior, someone who is walking the hero's path.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson