Help! We're trapped in the computer, and the computer is trapped in 2008! Someone call the time police!
0 Members and 1 Guest are viewing this topic.
[17:32:45] * xar sets mode: -oooooooooo algorithm ban chris cipher newby stdio TehUser tnarongi|away vursed warz[17:32:54] * xar sets mode: +o newby[17:32:58] <xar> new rule[17:33:02] <xar> me and newby rule all
Quote from: CrAz3D on June 30, 2008, 10:38:22 amI'd bet that you're currently bloated like a water ballon on a hot summer's day.That analogy doesn't even make sense. Why would a water balloon be especially bloated on a hot summer's day? For your sake, I hope there wasn't too much logic testing on your LSAT.
I'd bet that you're currently bloated like a water ballon on a hot summer's day.
[20:21:13] xar: i was just thinking about the time iago came over here and we made this huge bomb and light up the sky for 6 min[20:21:15] xar: that was funny
- Microsoft is aware of a public report of a vulnerability affectingInternet Explorer. The report indicates that Internet Explorer'sdefault behavior could allow a web page to not display script code when a user attempts to view the source of the page. - Our investigation reveals that the behavior described in the publicreport is not a vulnerability in the browser. Instead, this is a wellknown capability of dynamic html (DHTML) and is a standard feature ofmost browsers including Internet Explorer.- Microsoft is concerned that some security researchers may not know the appropriate email alias to report security vulnerabilities to theMicrosoft Security Response Center. Secure@microsoft.com is the public email alias for reporting security vulnerabilities to Microsoft.- We continue to encourage all security researchers to work withMicrosoft on a confidential basis so that we can work together inpartnership to help protect Microsoft's customers and not put them atunnecessary risk.- We continue to encourage customers follow our Protect Your PC guidance of enabling a firewall, getting software updates, and installing antivirus software. Customers can learn more about these steps at www.microsoft.com/protect.
On a "confidential basis"?SO that they blatently ignore your bug report until it is exploited?Fuck that.
Update: Microsoft claims it's a feature, not a bug:Quote- Microsoft is aware of a public report of a vulnerability affectingInternet Explorer. The report indicates that Internet Explorer'sdefault behavior could allow a web page to not display script code when a user attempts to view the source of the page. - Our investigation reveals that the behavior described in the publicreport is not a vulnerability in the browser. Instead, this is a wellknown capability of dynamic html (DHTML) and is a standard feature ofmost browsers including Internet Explorer.- Microsoft is concerned that some security researchers may not know the appropriate email alias to report security vulnerabilities to theMicrosoft Security Response Center. Secure@microsoft.com is the public email alias for reporting security vulnerabilities to Microsoft.- We continue to encourage all security researchers to work withMicrosoft on a confidential basis so that we can work together inpartnership to help protect Microsoft's customers and not put them atunnecessary risk.- We continue to encourage customers follow our Protect Your PC guidance of enabling a firewall, getting software updates, and installing antivirus software. Customers can learn more about these steps at www.microsoft.com/protect.