|
إنضمامك إلي منتديات استراحات زايد يحقق لك معرفة كل ماهو جديد في عالم الانترنت ...
انضم الينا
#1
| ||
| ||
One of our members, who turned out to be a scammer, succeeded to generate an overload on my servers, claiming he could get in by using the log in information of one of my moderators, by intercepting his cookie. Even if this claim is not true, there has been a lot of discussion going on in my team to see what should be done. For the time being we now all disable the "remember me" to avoid the sending of cookies. One of my mods has this idea. Is this something that can be done?? Quote: I notice the login credentials are sent in the clear i.e. not using SSL/https: If I were doing an audit this would be a Anyone scanning a public Wi-Fi network being used to log into WUS could capture username/password fairly easily. You might want to talk to V-bulletin about making a security upgrade here. __DEFINE_LIKE_SHARE__ |
مواقع النشر (المفضلة) |
| |
المواضيع المتشابهه | ||||
الموضوع | كاتب الموضوع | المنتدى | مشاركات | آخر مشاركة |
Forum Post-login issue - login doesn't "take" until user refreshes page. | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 04-28-2010 12:50 AM |
admin login problem - loops back to login | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 02-22-2010 02:50 PM |
Forum User Login and Admin login | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 02-03-2010 11:00 PM |
secure login to /admincp possible? | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 01-23-2010 01:10 AM |
Is using HTML in this way secure enough?... | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 09-26-2009 01:10 AM |