logo

New Response

« Return to the blog entry

You are replying to:

    • avatar
    • Jake Howlett
    • Posted on Tue 30 Sep 2008 08:17 AM

    Hi Richard,

    1) I don't get what you mean. The hacker is requesting a URL on their own server. Chances are it won't be Domino. It could be anything. They don't need the attacked server's router task to do anything

    2) See 1. No need to use POST. The GET request will do.

    3) Possibly. If applied.

Your Comments

Name:
E-mail:
(optional)
Website:
(optional)
Comment: