Security Basics mailing list archives
Re: How to....
From: "Greg" <security-basics () pchandyman com au>
Date: Thu, 29 Sep 2005 07:31:25 +1000
----- Original Message ----- From: "Clarkson, Dustin" <dustin.clarkson () wamu net> To: "Greg" <security-basics () pchandyman com au>; <security-basics () securityfocus com>
Sent: Wednesday, September 28, 2005 5:48 AM Subject: RE: How to....
This is stupid. You can always assign an icon to one application from another and trick someone into running it.
Exactly the thing that gets said before the shit hits the fan in the end. You ought to recognise a problem by now.
This is not low-level security at all, this is by design.
This isn't a design thing and if that is what you see it as, then you don't realise what has happened. Look again.
Greg.
Current thread:
- How to.... Greg (Sep 27)
- Re: How to.... Micheal Espinola Jr (Sep 28)
- Re: How to.... Ansgar -59cobalt- Wiechers (Sep 28)
- Re: How to.... Larry Offley (Sep 28)
- Re: How to.... Jacob Bresciani (Sep 28)
- Re: How to.... Greg (Sep 28)
- Re: How to.... Barrie Dempster (Sep 28)
- <Possible follow-ups>
- RE: How to.... Clarkson, Dustin (Sep 28)
- Re: How to.... Greg (Sep 28)
- Re: How to.... Ansgar -59cobalt- Wiechers (Sep 30)
- Re: How to.... Greg (Sep 28)
- RE: How to.... Smith, Jeff (Sep 28)
- RE: How to.... Craig Wright (Sep 28)