473,385 Members | 1,409 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Jim Ley gets Google to fix 2 year old security hole

Our very own Jim Ley is famous. Or maybe I should say infamous:

<url: http://www.infoworld.com/article/04/...Ngoogle_1.html
/>

I especially like the line: 'Malicious hackers could trigger the
vulnerability using a Google custom search form, or even through
a customized HTML (Hypertext Markup Language) link, by feeding
Google's servers computer script instead of an image URL,
according to the notice's author, who used the name "Jim Ley."'

Do you have a habit of using other names Jim?

:D

Jul 23 '05 #1
4 1186
On Fri, 22 Oct 2004 18:04:03 GMT, Grant Wagner
<gw*****@agricoreunited.com> wrote:
Our very own Jim Ley is famous. Or maybe I should say infamous:
hardly the server is only running at about 5 times its normal load -
more people have probably read the http request docs than the google
exploit.
according to the notice's author, who used the name "Jim Ley."'

Do you have a habit of using other names Jim?


I have no idea, that journalist I'd even emailed a couple of times in
response to some of his questions, I have no idea quite why he decided
I might've been using a fake name...

There's still an exploit if you're using NN4 btw...

Jim.
Jul 23 '05 #2
Lee
Jim Ley said:

On Fri, 22 Oct 2004 18:04:03 GMT, Grant Wagner

Do you have a habit of using other names Jim?


I have no idea, that journalist I'd even emailed a couple of times in
response to some of his questions, I have no idea quite why he decided
I might've been using a fake name...


Could be editorial policy if he only communicated with you on-line.

Jul 23 '05 #3
On 22 Oct 2004 14:46:00 -0700, Lee <RE**************@cox.net> wrote:
Jim Ley said:

On Fri, 22 Oct 2004 18:04:03 GMT, Grant Wagner

Do you have a habit of using other names Jim?


I have no idea, that journalist I'd even emailed a couple of times in
response to some of his questions, I have no idea quite why he decided
I might've been using a fake name...


Could be editorial policy if he only communicated with you on-line.


Maybe, I know he did talk to Paul (the Netcraft guy also mentioned in
the article)

Anyway, I've now become both an internet security expert and a
computer scientist according to the media - my CV's looking better all
the time.

Cheers,

Jim.
Jul 23 '05 #4
Jim Ley wrote:
On Fri, 22 Oct 2004 18:04:03 GMT, Grant Wagner
<gw*****@agricoreunited.com> wrote:

Our very own Jim Ley is famous. Or maybe I should say infamous:

Own?
I dont think he ever has even made IPO.
There are no shares of him on trade.
hardly the server is only running at about 5 times its normal load -
more people have probably read the http request docs than the google
exploit.
according to the notice's author, who used the name "Jim Ley."'
Do you have a habit of using other names Jim?

I have no idea, that journalist I'd even emailed a couple of times in
response to some of his questions, I have no idea quite why he decided
I might've been using a fake name...


An article composition trick.
He tried to mystify the whole thing to make look itsself like writing
something very important ;D

--
marekmand.kuubik.ee
Jul 23 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: WhenAmIOn.com | last post by:
Hi all, I developed a web site that uses javascript and XMLHTTP to dynamically load info on the page from the server without having to re-load the page. Recently I've received complaints of it...
52
by: Christopher Benson-Manica | last post by:
gets() is universally acknowledged to be broken and useless; however, it is still part of the standard library. Why? Is there enough conforming code out there using gets() to justify retaining...
280
by: jacob navia | last post by:
In the discussion group comp.std.c Mr Gwyn wrote: < quote > .... gets has been declared an obsolescent feature and deprecated, as a direct result of my submitting a DR about it (which...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.