Well, after all those years, almost twenty of them, I hang my sysadmin hat. With Debian, the last bastion, jumping ship and the fanaticism shattering the community, it took all the fun out of it.
Hello Networks !
from the hey-fellas-psssst-over-here dept.
Microsoft isn't standing idly by while Appple's app store fills with software; fysdt writes "A newly-announced service called the iOS to Windows Phone 7 API mapping tool acts as an interchange for developers to take applications they've already written for Apple's platform, and figure out ways to get the code work with Microsoft's standards."
Your argument was actually quite valide. The only thing I would add to it, is signing the page. Let me explain:
1. Do all the above steps
2. Hash ( and store ) the output buffer ( PHP ) before flushing it to the browser
3. When preparing the POST to send the auth to the server, have the JS include the hash of the current page
If they do not match: you know code was injected in the page.
An anonymous reader writes: In late September, there was a modest gathering of law enforcement officers, military personnel, and mental health professionals in the small western New York town of Hamburg. It was totally ignored by the mainstream media, with just a reporter from the Buffalo News on hand to record the proceedings. Lucky for us