« March 2006 »
S M T W T F S
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31

You are not logged in. Log in
Open Community
Post to this Blog

Helpful Links
Angelfire Home
Register Your Domain
Angelfire's Twitter
Angelfire's Facebook

Angelfire Club Blog
Need assistance and ideas from fellow Angelfire members to help build and manage your website? You've come to the right place!
To join this Community Blog, you must be an Angelfire member. Just click the "Join this Community" link, and start posting immediately.

Hint: When posting, select a topic that most relates to your question. (News, FrontPage, HTML Questions, etc...) This will help to keep the blog organized for everyone.

View Latest Entries

Saturday, 18 March 2006
iframe source help
Mood:  irritated
I have started using Angelfire months ago and was loving it, until now... I was experimenting with my site and was having trouble with an idea i was building until i discovered iframes, which would be perfect. However, whenever i tried to put in a source for the iframe, angelfire stops it by putting in a pgae saying that certain files shouldnt be downloaded due to blah blah blah and viruses. It's just a picture! No viruses! How do I get around this?!?!?


Posted by funky/captainclub at 11:22 PM EST | Post Comment | View Comments (5) | Permalink | Share This Post

Sunday, 19 March 2006 - 3:42 AM EST

Name: tom

Hello,

Apparently, there is a certain vulnerability
connected with the use if IFRAMES.

Here is something I found on Google:

IFRAME.BoF

IFRAME.BoF is an exploit for a buffer overrun vulnerability.....

The exploit is included in a malicious web page or in an e-mail message in HTML format, which contain executable code. This executable code is automatically run when a buffer overflow occurs while processing a specially crafted IFRAME, FRAME or EMBED tag.

If exploited successfully, IFRAME.BoF allows to run arbitrary code, which could be of any nature.

As mentioned above, this exploit is hosted in web pages or included in e-mail messages in HTML format. In order to exploit the vulnerability, a malicious user would have to entice the user into accessing one of those web pages or opening the e-mail message.

Some variants of the worm Mydoom use this exploit in order to affect computers.

READ MORE: http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?idvirus=54346

I hope this helps...

Sunday, 19 March 2006 - 9:24 AM EST

Name: cw

Whenever that has happened here before it's because an incomplete URL was used that doesn't start with http://. Check the URL you're entering as the frame source and make sure it starts with http://.

Sunday, 19 March 2006 - 3:45 PM EST

Name: tom

Hello again,

I found the following posts on the Blog,
which concern IFRAMES:

https://www.angelfire.com/blog/community/index.blog?start=1105406603
Simply scroll down to:
WED Jan 5, 2005

https://www.angelfire.com/blog/community/index.blog?entry_id=326259
Simply scroll down to:
SUN Jan 2, 3005

https://www.angelfire.com/blog/community/index.blog?start=1121296123
Simply scroll down to:
MON Jun 27, 2005

Hope that helps :)

Tuesday, 20 November 2018 - 4:10 AM EST

Name: "JSC result"
Home Page: http://https://www.jscresult2018.net/

There are various ways to check the JSC Result 2018 bd and all the possible ways to check and get your JSC and JDC exam results 2018 are given below for the students to understand the process and implement the same.

Wednesday, 1 May 2019 - 3:22 AM EDT

Name: "get robux"
Home Page: http://http://robloxfreerobuxgenerator.com/

Must be a nice post and good game this game is very famous in our country just play the game and full entertinment with you friends.

View Latest Entries