0 Members and 1 Guest are viewing this topic.
Thanks but how can I get rid of it?
Quote from: MeasureUp on January 24, 2018, 09:36:17 PMThanks but how can I get rid of it?I don't use IE/Edge but you can click on the more information drop down section and there should be a way to accept the certificate (it creates and Exception for this site and adds it to the 'safe' list)
•If you arrived at this page by clicking a link, check the website address in the address bar to be sure that it is the address you were expecting.•When going to a website with an address such as https://example.com, try adding the 'www' to the address, https://www.example.com.For more information, see "Certificate Errors" in Internet Explorer Help.
To Mick.I have no choice. I use company's pc. IE is the only browser allowed to use.
Thanks MP.
Quote from: MeasureUp on January 24, 2018, 10:18:35 PMTo Mick.I have no choice. I use company's pc. IE is the only browser allowed to use.When will they ever learn...?
Quote from: MickD on January 24, 2018, 10:22:40 PMWhen will they ever learn...? Yikes! Who forces people to use IE?!! You guys still running XP too?
When will they ever learn...?
I was suspecting that IT has added swamp's address to their block list so I started the thread.Quote from: ronjonp on January 25, 2018, 08:35:32 AMQuote from: MickD on January 24, 2018, 10:22:40 PMWhen will they ever learn...? Yikes! Who forces people to use IE?!! You guys still running XP too? Who forces...The answer is always "IT". BTW We use Win7.
...Also, Chrome doesn't support rendering XML as HTML using an XSL stylesheet; apparently it's a "security feature" (read as: "we just don't want to do it") which is highly useful for self-documenting data files....
Imagine this scenario: You receive an email message from an attacker containing a web page as an attachment, which you download. You open the now-local web page in your browser. The local web page creates an <iframe> whose source is https://mail.google.com/mail/. Because you are logged in to Gmail, the frame loads the messages in your inbox. The local web page reads the contents of the frame by using JavaScript to access frames[0].document.documentElement.innerHTML. (An online web page would not be able to perform this step because it would come from a non-Gmail origin; the same-origin policy would cause the read to fail.) The local web page places the contents of your inbox into a <textarea> and submits the data via a form POST to the attacker's web server. Now the attacker has your inbox, which may be useful for spamming or identify theft.Chrome foils the above scenario by putting restrictions on local files opened using Chrome. To overcome these restrictions, you've got two solutions: Try running Chrome with the --allow-file-access-from-files flag. I've not tested this myself, but if it works, your system will now also be vulnerable to scenarios of the kind mentioned above. Upload it to a host, and problem solved.