|
|
Avoid a security vulnerability in Safari
Perhaps somebody should write a folder action that strips the 'usro' resource from files (and maybe the creator code for good measure). Then you could attach it to your downloads folder, set it to activate for any newly-added file, and this sort of attack would be neutralized.
Avoid a security vulnerability in Safari
I think some one already did a script here.
Avoid a security vulnerability in Safari
The only script I see there is one that deletes the entire resource fork from every file. This will break any file that relies on having a valid resource fork! We need something that only deletes (or replaces) the usro resource. AFAICT, for somebody who understands the APIs involved this shouldn't be a terribly hard thing to do. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.21 seconds |
|