Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Zhen-Xjell

Pages: 1 [2] 3 4
16
Could be, but I'm not familiar with it.


17
Proxo won't change anything on the system at all unless you use the installer package, which I never have.  So in my experience, Proxo doesn't alter anything.  I concur, if you are using Norton, that may have changed your OE settings automatically.


18
http://news.zdnet.co.uk/story/0,,t269-s2103029,00.html

"Phil Zimmermann, the creator of the Pretty Good Privacy encryption tool,
says that widespread surveillance is leading us into an Orwellian future."

Pretty interesting insight into Phil's mind.


19
TIP: You don't need flash installed at all.


20
There is http://www.try2hack.nl/ .  I made it past level 8 and stopped at the door to level 9, b/c I have no interest for level 9.


21
Community Discussions (Non-Forum Related) / One OS to rule them All
« on: January 23, 2002, 03:45:15 AM »
Recently one of my friends, a computer wizard, paid me a visit. As we were
talking I mentioned that I had recently installed Windows XP on my PC. I
told him how happy I was with this operating system and showed him the
Windows XP CD. To my surprise he threw it into my microwave oven and turned
it on. Instantly I got very upset, because the CD had become precious to me,
but he said: "Do not worry, it is unharmed".

After a few minutes he took the CD out, gave it to me and said: "Take a
close look at it." To my surprise the CD was quite cold to hold and it
seemed to be heavier than before. At first I could not see anything, but on
the inner edge of the central hole I saw an inscription, an inscription
finer than anything I had ever seen before. The inscription shone piercingly
bright and yet remote, as if out of a great depth:

12413AEB2ED4FA5E6F7D78E78BEDE820945092OF923A40EElOE5IOCC98D44AA08E324

"I cannot understand the fiery letters", I said in a timid voice. "No but I
can", he said. "The letters are Hex, of an ancient mode, but the language is
that of Microsoft, which I shall not utter here. But in common English this
is what it says:

One OS to rule them all,
One OS to find them,
One OS to bring them all
And in the darkness bind them.

It is only two lines from a verse long known in System lore:
"Three OS's from corporate kings in their towers of glass, Seven from valley
lords where orchards used to grow, Nine from dotcoms doomed to die, One from
the Dark Lord Gates on his dark throne In the Land of Redmond where the
Shadows lie. One OS to rule them all, one OS to find them, One OS to bring
them all and in the darkness bind them, In the Land of Redmond where the
Shadows lie."
____________________________________________________________________________
______________    _______________________________
It WANTS to be installed



22
-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Alert Summary AS02-03
January 21, 2002

X-Force Vulnerability and Threat Database: http://xforce.iss.net

To receive these Alert Summaries, as well as other Alerts and
Advisories, subscribe to the Internet Security Systems Alert
mailing list at: http://xforce.iss.net/maillists/index.php

This summary is available at the following address:
http://xforce.iss.net/alerts/AS02-03.php
_____
Contents:
* 40 Reported Vulnerabilities
* Risk Factor Key
_____


Date Reported:          01/09/2002
Brief Description:      Dino Webserver "dot dot" directory traversal
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     Dino's Webserver 1.x
Vulnerability:          dinos-webserver-directory-traversal
X-Force URL:            http://xforce.iss.net/static/7853.php

Date Reported:          01/09/2002
Brief Description:      MiraMail stores authentication information in
                        plaintext in .ini file
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     MiraMail 1.04
Vulnerability:          miramail-plaintext-auth-info
X-Force URL:            http://xforce.iss.net/static/7855.php

Date Reported:          01/09/2002
Brief Description:      X-Chat CTCP ping request allows users to execute
                        IRC commands
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Red Hat Linux 6.2, Red Hat Linux 7.0, Red Hat
                        Linux 7.1, Red Hat Linux 7.2, X-Chat 1.4.2, X-
                        Chat 1.4.3
Vulnerability:          xchat-ctcp-ping-command
X-Force URL:            http://xforce.iss.net/static/7856.php

Date Reported:          01/10/2002
Brief Description:      Slashcode allows any logged in user to access
                        arbitrary accounts
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Slashcode 2.1.x, Slashcode 2.2, Slashcode 2.2.1,
                        Slashcode 2.2.2
Vulnerability:          slashcode-account-access
X-Force URL:            http://xforce.iss.net/static/7863.php

Date Reported:          01/08/2002
Brief Description:      Caldera UnixWare CDE dtlogin error log directory
                        /var/dt/ symlink
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     Caldera UnixWare 7.1.0
Vulnerability:          unixware-dtlogin-log-symlink
X-Force URL:            http://xforce.iss.net/static/7864.php

Date Reported:          01/10/2002
Brief Description:      Palm OS nmap scan denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Palm OS 3.5h
Vulnerability:          palmos-nmap-dos
X-Force URL:            http://xforce.iss.net/static/7865.php

Date Reported:          01/09/2002
Brief Description:      Multiple VPN daemons allow remote attackers to
                        modify packets
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     tinc 1.0pre3, tinc 1.0pre4, Vtun 2.5b1
Vulnerability:          vpn-modify-packets
X-Force URL:            http://xforce.iss.net/static/7868.php

Date Reported:          01/10/2002
Brief Description:      Geeklog could allow an attacker to modify UID of
                        authentication cookie to gain unauthorized
                        access
Risk Factor:            Medium
Attack Type:            Host Based / Network Based
Platforms Affected:     Geeklog 1.3
Vulnerability:          geeklog-modify-auth-cookie
X-Force URL:            http://xforce.iss.net/static/7869.php

Date Reported:          01/09/2002
Brief Description:      Multiple VPN daemons vulnerable to replay attack
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     tinc 1.0pre3, tinc 1.0pre4, Vtun 2.5b1
Vulnerability:          vpn-replay-attack
X-Force URL:            http://xforce.iss.net/static/7870.php

Date Reported:          01/09/2002
Brief Description:      tinc IV is a weak salt
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     tinc 1.0pre3, tinc 1.0pre4
Vulnerability:          tinc-weak-salt
X-Force URL:            http://xforce.iss.net/static/7871.php

Date Reported:          01/10/2002
Brief Description:      Snort specially-crafted ICMP packet denial of
                        service
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     Snort 1.8.3
Vulnerability:          snort-icmp-dos
X-Force URL:            http://xforce.iss.net/static/7874.php

Date Reported:          01/14/2002
Brief Description:      Web Server 4D/eCommerce "dot dot" directory
                        traversal
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     Web Server 4D/eCommerce 3.5.3
Vulnerability:          ws4d-dot-directory-traversal
X-Force URL:            http://xforce.iss.net/static/7878.php

Date Reported:          01/14/2002
Brief Description:      Web Server 4D/eCommerce long URL denial of
                        service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Web Server 4D/eCommerce 3.5.3
Vulnerability:          ws4d-long-url-dos
X-Force URL:            http://xforce.iss.net/static/7879.php

Date Reported:          01/14/2002
Brief Description:      Pi3Web HTTP Server long CGI parameter buffer
                        overflow
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Pi3Web HTTP Server 2.0
Vulnerability:          pi3web-long-parameter-bo
X-Force URL:            http://xforce.iss.net/static/7880.php

Date Reported:          01/07/2002
Brief Description:      Linux groff preprocessor buffer overflow
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Red Hat Linux 7.0, Red Hat Linux 7.1, Red Hat
                        Linux 7.2
Vulnerability:          linux-groff-preprocessor-bo
X-Force URL:            http://xforce.iss.net/static/7881.php

Date Reported:          01/07/2002
Brief Description:      CIPE packet handling denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     CIPE 1.5.2 and earlier, Debian Linux 2.2
Vulnerability:          cipe-packet-handling-dos
X-Force URL:            http://xforce.iss.net/static/7883.php

Date Reported:          01/14/2002
Brief Description:      Sudo fails to clean environment variable prior
                        to invoking a MTA allowing an attacker to gain
                        root privileges
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Conectiva Linux 5.0, Conectiva Linux 5.1,
                        Conectiva Linux 6.0, Conectiva Linux 7.0,
                        Conectiva Linux ecommerce, Conectiva Linux prg
                        graficos, Debian Linux 2.2, Engarde Secure Linux
                        1.0.1, Mandrake Linux 7.1, Mandrake Linux 7.2,
                        Mandrake Linux 8.0, Mandrake Linux 8.1, Mandrake
                        Linux Corporate Server 1.0.1, Mandrake Single
Vulnerability:          sudo-unclean-env-root
X-Force URL:            http://xforce.iss.net/static/7891.php

Date Reported:          01/12/2002
Brief Description:      Microsoft Windows 95 Backup long file extension
                        buffer overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Windows 95 All versions
Vulnerability:          win95-backup-bo
X-Force URL:            http://xforce.iss.net/static/7892.php

Date Reported:          01/11/2002
Brief Description:      Alcatel Speed Touch Home ADSL modems nmap OS
                        detection scan denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Alcatel Speed Touch ADSL modem Home
Vulnerability:          alcatel-speedtouch-nmap-dos
X-Force URL:            http://xforce.iss.net/static/7893.php

Date Reported:          01/16/2002
Brief Description:      Sambar Server cgitest.exe example script denial
                        of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Sambar Server 5.1
Vulnerability:          sambar-cgitest-dos
X-Force URL:            http://xforce.iss.net/static/7894.php

Date Reported:          01/15/2002
Brief Description:      BlackMoon FTP Server static buffer overflow
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     BlackMoon FTP Server 1.5 R1 Build 1547
Vulnerability:          blackmoon-ftpd-static-bo
X-Force URL:            http://xforce.iss.net/static/7895.php

Date Reported:          01/13/2002
Brief Description:      Eterm $HOME environment variable buffer overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Eterm 0.9.1
Vulnerability:          eterm-home-bo
X-Force URL:            http://xforce.iss.net/static/7896.php

Date Reported:          01/10/2002
Brief Description:      Legato nsrd daemon creates "logs" directory with
                        insecure permissions
Risk Factor:            Low
Attack Type:            Host Based
Platforms Affected:     Legato NetWorker 6.1
Vulnerability:          legato-nsrd-log-permissions
X-Force URL:            http://xforce.iss.net/static/7897.php

Date Reported:          01/10/2002
Brief Description:      Legato nsrd daemon creates log file in plaintext
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     Legato NetWorker 6.1
Vulnerability:          legato-nsrd-log-plaintext
X-Force URL:            http://xforce.iss.net/static/7898.php

Date Reported:          01/08/2002
Brief Description:      Mandrake Linux BIND implementation uses insecure
                        permissions
Risk Factor:            Medium
Attack Type:            Host Based
Platforms Affected:     Mandrake Linux 8.0, Mandrake Linux 8.1
Vulnerability:          mandrake-bind-insecure-permissions
X-Force URL:            http://xforce.iss.net/static/7899.php

Date Reported:          01/08/2002
Brief Description:      PGP Outlook plug-in saves a decrpted copy of
                        encrypted emails
Risk Factor:            Low
Attack Type:            Host Based
Platforms Affected:     Microsoft Outlook 98, PGP 7.0
Vulnerability:          pgp-outlook-decrypted-copy
X-Force URL:            http://xforce.iss.net/static/7900.php

Date Reported:          01/14/2002
Brief Description:      Siemens wireless invalid SMS denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Siemens 3568i WAP
Vulnerability:          siemens-invalid-sms-dos
X-Force URL:            http://xforce.iss.net/static/7902.php

Date Reported:          01/15/2002
Brief Description:      NetGear Cable/DSL router WAN port scan denial of
                        service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     NetGear RP114 Cable/DSL Web Safe Router Firmware
                        3.26
Vulnerability:          netgear-wan-scan-dos
X-Force URL:            http://xforce.iss.net/static/7903.php

Date Reported:          01/09/2002
Brief Description:      VTun ECB mode uses weak encryption
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Vtun 2.5b1
Vulnerability:          vtun-ecb-weak-encryption
X-Force URL:            http://xforce.iss.net/static/7904.php

Date Reported:          01/14/2002
Brief Description:      ClanLib long environment variable buffer
                        overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     ClanLib 5.0
Vulnerability:          clanlib-long-env-bo
X-Force URL:            http://xforce.iss.net/static/7905.php

Date Reported:          01/12/2002
Brief Description:      Internet Explorer clipboardData object allows a
                        remote attacker to view clipboard information
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     Microsoft Internet Explorer 5.0, Microsoft
                        Internet Explorer 5.01, Microsoft Internet
                        Explorer 5.5
Vulnerability:          ie-clipboarddata-view-clipboard
X-Force URL:            http://xforce.iss.net/static/7906.php

Date Reported:          01/15/2002
Brief Description:      SGI IRIX nsd cache size denial of service
Risk Factor:            Low
Attack Type:            Network Based
Platforms Affected:     IRIX 6.5.10, IRIX 6.5.11, IRIX 6.5.4, IRIX
                        6.5.5, IRIX 6.5.6, IRIX 6.5.7, IRIX 6.5.8, IRIX
                        6.5.9
Vulnerability:          irix-nsd-cache-dos
X-Force URL:            http://xforce.iss.net/static/7907.php

Date Reported:          01/13/2002
Brief Description:      PHP creates insecure temporary session ID files
Risk Factor:            Low
Attack Type:            Host Based
Platforms Affected:     PHP 4.1.1, PHP4 All versions
Vulnerability:          php-session-temp-disclosure
X-Force URL:            http://xforce.iss.net/static/7908.php

Date Reported:          01/16/2002
Brief Description:      Linux /usr/bin/at command invalid execution time
                        heap corruption
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Debian Linux 2.2, SuSE Linux 6.4, SuSE Linux
                        7.0, SuSE Linux 7.1, SuSE Linux 7.2, SuSE Linux
                        7.3
Vulnerability:          linux-at-exetime-heap-corruption
X-Force URL:            http://xforce.iss.net/static/7909.php

Date Reported:          01/15/2002
Brief Description:      ActivePython ActiveX control could allow a
                        remote attacker to read arbitrary files
Risk Factor:            Medium
Attack Type:            Network Based
Platforms Affected:     ActivePython 2.1, Microsoft Internet Explorer
                        All versions, Windows All versions
Vulnerability:          activepython-activex-read-files
X-Force URL:            http://xforce.iss.net/static/7910.php

Date Reported:          01/16/2002
Brief Description:      Chinput long environment variable buffer
                        overflow
Risk Factor:            High
Attack Type:            Host Based
Platforms Affected:     Chinput 3.0
Vulnerability:          chinput-long-env-bo
X-Force URL:            http://xforce.iss.net/static/7911.php

Date Reported:          01/16/2002
Brief Description:      Cisco MGC (Media Gateway Controller) Solaris 2.6
                        exposure
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Cisco BAMS running Solaris 2.6, Cisco PGW 2200
                        9.1(x) and earlier, Cisco SC2200 7.4(x) and
                        earlier, Cisco VSC3000 9.1(x) and earlier, Cisco
                        VSPT running Solaris 2.6
Vulnerability:          cisco-mgc-exposure
X-Force URL:            http://xforce.iss.net/static/7912.php

Date Reported:          01/17/2002
Brief Description:      PHP-Nuke index.php allows remote attackers to
                        execute arbitrary commands from an included file
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     PHP-Nuke 5.3.1 and earlier
Vulnerability:          phpnuke-index-command-execution
X-Force URL:            http://xforce.iss.net/static/7914.php

Date Reported:          01/17/2002
Brief Description:      Avirt Gateway Suite telnet proxy could allow
                        unauthorized access
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Avirt Gateway Suite 4.2
Vulnerability:          avirt-gateway-telnet-access
X-Force URL:            http://xforce.iss.net/static/7915.php

Date Reported:          01/17/2002
Brief Description:      Avirt SOHO, Gateway, and Gateway Suite HTTP
                        proxy buffer overflow
Risk Factor:            High
Attack Type:            Network Based
Platforms Affected:     Avirt Gateway 4.2, Avirt Gateway Suite 4.2,
                        Avirt SOHO 4.2
Vulnerability:          avirt-http-proxy-bo
X-Force URL:            http://xforce.iss.net/static/7916.php

_____

Risk Factor Key:

     High     Any vulnerability that provides an attacker with immediate
              access into a machine, gains superuser access, or bypasses
              a firewall. Example: A vulnerable Sendmail 8.6.5 version
              that allows an intruder to execute commands on mail server.
     Medium   Any vulnerability that provides information that has a high
              potential of giving system access to an intruder. Example:
              A misconfigured TFTP or vulnerable NIS server that allows
              an intruder to get the password file that could contain an
              account with a guessable password.
     Low      Any vulnerability that provides information that could
              potentially lead to a compromise. Example: A finger that
              allows an intruder to find out who is online and potential
              accounts to attempt to crack passwords via brute force
              methods.

______

About Internet Security Systems (ISS)
Internet Security Systems is a leading global provider of security
management solutions for the Internet, protecting digital assets and
ensuring safe and uninterrupted e-business. With its industry-leading
intrusion detection and vulnerability assessment, remote managed
security services, and strategic consulting and education offerings, ISS
is a trusted security provider to more than 8,000 customers worldwide
including 21 of the 25 largest U.S. commercial banks and the top 10 U.S.
telecommunications companies. Founded in 1994, ISS is headquartered in
Atlanta, GA, with additional offices throughout North America and
international operations in Asia, Australia, Europe, Latin America and
the Middle East. For more information, visit the Internet Security
Systems web site at www.iss.net or call 888-901-7477.

Copyright (c) 2002 Internet Security Systems, Inc. All rights reserved
worldwide.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express consent of
the X-Force. If you wish to reprint the whole or any part of this Alert in
any other medium excluding electronic medium, please e-mail [email protected]
for permission.

Disclaimer

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php
as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force
[email protected] of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBPE17AjRfJiV99eG9AQHuWQP/eC/ARz76eXEj8D/CH4LNx0cjaD6fOryu
qJ0H1tZWB4NqQqifYYRISWadqAL0vS2caG1a8tp1BTq1G98IBcUagI0We1NMEgw3
Ih4jn4LcNb+jr3sLaEwWaoXxvyb+Stdzmo9D3UCyoFQtFX57SbqPBB74I+qKB0PZ
LmBaBhTOTF4=
=Eeya
-----END PGP SIGNATURE-----


23
Configuration Files / ZXList Beta 2.50 Now Out - For Naoko 4.1
« on: January 15, 2002, 04:08:34 PM »
LOL.. the lady bug is still there, you can just replace the "clear.gif" with the web bug.


24
Feature-Block / geocities
« on: January 13, 2002, 04:35:44 PM »
Welcome aboard.  Can you provide some links?


25
Feature-Block / Real URLs in "go.to" or "kickme.to" like sites
« on: January 10, 2002, 03:25:47 AM »
I can't upload a file here, but when I enabled Part 1, 2 and 5 for Convert Frames to Links and Frame-To-Links filters, I get a web page with the real links to the pages, and I can click them and get the real deal.  They are in my ZXList.


26
Feature-Block / Real URLs in "go.to" or "kickme.to" like sites
« on: January 09, 2002, 05:31:09 AM »
There are some convert frames to links filters in my ZXlist if that is something you want to give a try.

Welcome to Arne's!  Pull up a sofa.  ;)


27
Configuration Files / ZXList Beta 2.50 Now Out - For Naoko 4.1
« on: January 06, 2002, 06:40:06 AM »
http://laudanski.com/#PROXO

This release works for the new Proxomitron Naoko 4.1.  Please don't use previous versions with this new Naoko release.



28
Configuration Files / Beta 2.00 Released
« on: December 27, 2001, 04:02:30 PM »
http://laudanski.com/#PROXO

Zhen-Xjell Configuration Files Changelog for use by Scott R. Lemmon's Proxomitron.


[2001.12.26] - Release 2.00 Beta

- Added "www.codeproject.com/script/admentor/images/" to ZXList.txt.


[2001.12.23]

- Added Tame Javascript from: http://www.geocities.com/u82011729/prox/filter.html#tamescripts.  This consists of two filters "Tame Javascript" parts 1 and 2.  Enabling both of these will break the full functionality of the "Smart pop-up windows killer" filter. Enable these only if you do not care about opening pop-up links via "Smart pop-up windows killer".  TWo js files come with the filters, start and end, both of which are found in the html subdir.

- Added "Allow Right Click" web filter from this link: http://groups.yahoo.com/group/prox-list/message/8428.


[2001.12.22]

- Added new header filter: "Location: Yahoo relocator (in)" from http://groups.yahoo.com/group/prox-list/message/8383.  This works great for the "interrupt" pages.

- Added new filter from http://groups.yahoo.com/group/prox-list/message/8345 titled: "Yahoo interrupt automatifier".  I use this tweaked up version to handle pages that come up after posting via the web interface.  Changes shown here: http://groups.yahoo.com/group/prox-list/message/8396 .


[2001.12.21]

- User-Agent for Hotmail Header Filter needed updating.  I found that "hotmail.com" needed to be entered for Outlook Express to properly connect to the Hotmail server.  

- Added "*.virtualratings.com/ads/" to ZXList.

- Removed the web bug code from "hotmail.htm".  This file was obtained from Greg's kitchen sink originally.


[2001.12.20]

- Added hotmail.htm to the html subdir in the zxlist, which will allow the hotmail filters to work properly.  The file was taken from Greg's kitchen sink filter set.

- Added two more filters to the hotmail set from Jor in this post: http://asp.flaaten.dk/pforum/topic.asp?ARCHIVE=&TOPIC_ID=37.

- Changed the location of the hotmail.htm file in the web filter set Hotmail Login.  It pointed to dhtml/html/HotMail/HotMail.htm, but now points to dhtml/html/hotmail.htm.  Also added a "logo.gif" in the html subdir which is used by hotmail.htm.


[2001.12.18]

- Added " align="absmiddle"" to the "Bypass redirects in links" web filter inside the Replacement field to align the image in absolute middle.  Thanks go to this suggestion from Aleks.

- Disabled the header filter: "User-Agent: (random)", where "User-Agent: (out) Rotate" does the job perfectly.  Thanks to RLD, I replaced a single quotation with a carriage return for the web filter: "Kill IFRAME popups".


[2001.12.16]

- Added "am7.netfirms.com/nf-images/" to ZXList.txt.



29
SSL / Question for a newbie
« on: December 25, 2001, 11:38:22 PM »
Forgot to add, same URL:

Filter 'secure; (https://) pages
This option allows Proxomitron to actively filter secure SSL webpages, but only if you've supplied the ssleay32.dll and libeay32.dll files. For legal reasons Proxomitron doesn't come with these files (see below).


Also, check the URL, at the bottom is more info on the SSL files.


30
SSL / Question for a newbie
« on: December 25, 2001, 11:36:48 PM »
Available via the online help page here: http://laudanski.com/proxomitron/help/CfgT5.html#foo

<i>Send HTTP/1.0 Requests
Some older proxies and perhaps a very few web servers many not like the newer HTTP/1.1 protocols Proxomitron now supports. If you click this Proxomitron will make all requests as HTTP/1.0 In most cases you shouldn't need to worry about this.
</i>


Pages: 1 [2] 3 4