Link: http://goo.gl/7mkeEE
Is made by http://idragonsolution.com/ :D
if you want you can enter withUsername: user2Password: 123456
Link: http://goo.gl/7mkeEE
Is made by http://idragonsolution.com/ :D
if you want you can enter withUsername: user2Password: 123456
I have payed for this ;)
Do you like my theme design?
Link: http://goo.gl/7mkeEE
Is made by http://idragonsolution.com/ :D
if you want you can enter withUsername: user2Password: 123456
Looks very nice, but I notice the required Oxwall attribution link is missing http://www.oxwall.org/attribution
I've read several books on security and links like the one posted from Simone has been mentioned to stay away from if a regular user.
It's considered to be part of a Reflected XSS (also known as nonpersistent XSS) which are attacks that send malicious content to the server, so that in the server response, the malicious content is embedded.
The malicious user targets a site that is obviously reflecting data from the user back to them -> The malicious user tests a simple XSS to see if it works -> The malicious user crafts a more malicious URL (which the malicious user might shorten it with a URL shortening service... -> The regular user clicks the link, and the site reflects the script into the user's browser. The script executes (unbeknownst to them). The attack is successful...
If you don't believe what I just provided - buy the book: "Fundamentals of Web Development" by Randy Connolly and Ricardo Hoar and read chapter 16 (Security).
Or, read this article posted on "lifehacker.com": http://lifehacker.com/...ogl-links-on-twitter
These types of links, as well as many others, are a form of virus.
Just providing word of caution to the oxwall users :)
You might as well just provide your original/official URL -> I'm sure it would receive more traffic if you do since most users (or at least tech savy users) rarely, if at all, click on shortened URLs now-a-days due to such issues with shortened URLs.