xsl-list
[Top] [All Lists]

Re: [xsl] HTML5 semantics and XSLT

2022-02-23 10:51:24
Amazingly, it appears to be true that opened in a current web browser,
a document like the following will proceed to execute the script it
contains.

HTML email was always evil.

The webmail clients that I’ve used recently have all been removing
images and scripts before presenting the messages, I think.

Opening random web pages is risky. And if you’ve disabled some of the
security features in your browser because you want, for example, to run
scripts off of file: URIs, you’re just making things even riskier for
yourself.

Otherwise, at least as reported in the post cited above, an OpenOffice
document, when previewed in certain execution contexts, can act much
like a Word document with embedded malware.

Seems likely.

                                        Be seeing you,
                                          norm

--
Norman Tovey-Walsh <ndw(_at_)nwalsh(_dot_)com>
https://nwalsh.com/

In every work of genius we recognize our own rejected thoughts; they
come back to us with a certain alienated majesty.--Emerson
--~----------------------------------------------------------------
XSL-List info and archive: http://www.mulberrytech.com/xsl/xsl-list
EasyUnsubscribe: http://lists.mulberrytech.com/unsub/xsl-list/1167547
or by email: xsl-list-unsub(_at_)lists(_dot_)mulberrytech(_dot_)com
--~--

Attachment: signature.asc
Description: PGP signature

<Prev in Thread] Current Thread [Next in Thread>