in reply to Re: Removing malicious HTML entities (now with more questions!)
in thread Removing malicious HTML entities (now with more questions!)

There are no passwords. By 'safe', I meant 'unable to be exploited' (leading to me replacing html markup).

Regarding the interception discussion, what methods could the user use? The only thing I can think of is downloading the cgi file through the use of wget (or anything, really). Then open and read.

Update: Nevermind, that method does not work. It downloads the html the cgi file outputs. But what other ways were you referring to?

I'm so adjective, I verb nouns!

chomp; # nom nom nom

  • Comment on Re^2: Removing malicious HTML entities (now with more questions!)

Replies are listed 'Best First'.
Re^3: Removing malicious HTML entities (now with more questions!)
by dHarry (Abbot) on Aug 16, 2008 at 12:26 UTC
    See the link I provided, and also see Hacking CGI. Just Google or Super Search the Monastery.

      Already am and will do.

      I'm so adjective, I verb nouns!

      chomp; # nom nom nom