|
|
Article has changed
I downloaded the text early today when I read about this exploit on MacInTouch. In the interim it has now removed some of the more serious how-tos and such regarding spoofing and impersonating.
Article has changed - NOT!
I just checked and there are TWO versions of the exploit, the one linked to in the article on MACOSXHINTS ( http://www.cunap.com/~hardingr/projects/osx/ )and the link from the mention on MacInTouch which has a more detailed descrption. ( http://www.cunap.com/~hardingr/projects/osx/exploit.html )
Why shouldn't he demonstrate the exploit?
It's quite common for security holes to be demonstrated, even if it is to show you how simple it can be done. Don't feel threatened by the fact that a 'step-by-step' tutorial is given. I would have come up with more or less the same procedure.
Why shouldn't he demonstrate the exploit?
The exploit is demonstrated here
|
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.09 seconds |
|