monstercse6
Coraz więcej gadania
Dołączył: 22 Lut 2011
Posty: 180
Przeczytał: 0 tematów
Ostrzeżeń: 0/5 Skąd: England
|
Wysłany: Czw 19:09, 05 Maj 2011 Temat postu: Beats By Dre . The first part of this sentence |
|
|
2. server settings wrong, causing google to index and access to these files, it is more terrible, a direct result of all Internet users can access these files.
privacy 360, 360 argues that . Here, I want to express certain level of 360 public relations, because it outright,
Jinshan blamed for leaking
2. Even if you want to upload the rest, a superficial, which can be passed, which can not pass, I'm sure you know more than I;
Finally, I want to give 360,[link widoczny dla zalogowanych], including Jinshan, and other security vendors, for
1. just upload HOST part, do not upload the entire URL;
3. analysis immediately deleted, not stored on the server.
made two low-level error, you spare the heart are not guilty? You do not need to stand up and apologize? You blame other people have confused this? Kill someone, you can go kill the people? Even if someone really has to do, at least someone does not leak to the Internet.
However, I would like to ask the user privacy in this incident, has indeed been leaked. How do you explain that? How do you explain that contain user passwords and other privacy,[link widoczny dla zalogowanych], why is google indexed files, and thus to the general Internet users get? At least you did not even manage your own server, how to help the users manage the machine?
After talking about these two you can not excuse the low-level errors, we talk about You say such as: user ID, computer name, etc.). The first part of this sentence, I believe. But In fact, when the user submits the form, completely possible to the user name and password in clear text form in the URL to the site, depending on how the web design. Of course, the site will do less. Why do you want to about: blank this site are uploaded it? Why do you all have submitted URL to it, rather than submit HOST part? You do not think that was a bit how you collect? You might argue that some sites are only secondary or even tertiary malicious Web site behavior, this may need to upload the full URL? That I think that cloud your security is not enough intelligence. You can upload the first part, such [link widoczny dla zalogowanych] it will not be a malicious act, right? If you hit a Web site really is in the blacklist, you then upload the rest, but as of last Well, even if you really want to collect all of you doing to save up to determine finished? This is your so-called normal function of it? Well, even if you want to save, you save up to add a line does not close? Well, even if you do not encrypt, you take the possession of your own server, you can get access to what matter is called ah?
Even if I believe your
1. in plain text stored on the server which may contain user passwords and other private documents, even if only some URL,[link widoczny dla zalogowanych], will cause the server can access all the management staff can access these files, it does not meet the classification authority management principles;
you really are not guilty that it? I would like you to my colleagues that the management server should be cut, right? You really do not want to apologize?
Post został pochwalony 0 razy
|
|