-
This error is due to IE8's Cross-Site Scripting (XSS) protection blocking requests sent across sites.
Click "Tools" - "Internet Options" in IE8, enter the "Security" tab, open the "Custom Level" under "Internet", find "Enable XSS Filter" in the "Security Settings" dialog box, and change it to "Disable".
-
Internet Explorer - Tools - Internet Options - Security - Customization Level. Find the xss filter and select Disable. Then it's all right or apply.
-
Advertisements that are suspected will be automatically filtered.
-
Update your browser to IE8
-
Fix the XSS cross-site vulnerability on **, perform security verification on get, post, and cookies, intercept XSS cross-site attacks**, or reset the security protection parameters to make it conform to the ** environment at that time. If you don't know how to fix the best vulnerabilities, you can also find a professional security company to deal with it.
-
If you delete it, it will come out again, as long as the hacker remembers the code.
-
Try filtering parameters, escaping or filtering the user output. General <>"'If you don't need to filter all of these, remember to filter the corresponding escapes, and the security will be improved.
-
Can you try to fix it with this?
Hope it helps. Thank you.. It's good to adopt.
-
The same is true for cross-site scripting, which is brought to the database without filtering the data, and then when output, it can be used to achieve the purpose of executing itself by matching the ** in front of the closed html page, that is, using xss to steal cookies.
-
What's so nice about injection is that the parameters passed are not filtered, resulting in malicious ** being put into the SQL statement, and then the single quotation mark demonstrated by the database is the single quotation mark that closes the original SQL statement, which is not interesting.
-
Untrusted Data Untrusted data is usually data from HTTP requests, in the form of URL parameters, form fields, headers, or cookies. However, from the perspective of An Gaoheng, the data from the database, the bureau Nianqi network server and other ** data are often not trusted, that is, these data may not be fully verified. You should always be on untrustworthy data.
2003 Worm King (Virus Archive:
Virus introduction: It was intercepted by Ruixing Company in China on January 25. It exploits the vulnerabilities of the SQL Server 2000 system and uses the "buffer overflow" technology to carry out network infection and network attacks, thereby causing serious harm to the network and server. >>>More
Summary. 1 5 The file that needs to be opened can be opened by pressing the up, down, left, right and enter keys. 2 5 Use the Alt+Tab key to switch the open file view until the view needs to be closed. >>>More
We all know that we need to use a PDF reader to view PDF documents, but different documents need to be replaced with other more convenient reading modes to browse, what are the reading modes? How do you switch between them? >>>More
Anti-aliasing: Due to the restriction of resolution in 3D images, the edges of objects will always show more or less triangular aliasing, and anti-aliasing refers to the softening of the edges of the image to make the edges of the image look smoother and closer to the real object. It is one way to improve the quality of the picture to soften it. >>>More
Plugged in the discrete graphics card, the motherboard will automatically block the integrated graphics card, did the landlord not change the graphics card data cable interface to the discrete graphics card? >>>More