Use IFRAME to implement web page embedded and preload
-------------------------------------------------- ------------------------------ http://www.sina.com.cn 2001/09/04 14:37 China Is the computer education report Liu Mingfeng in the HTM (HTML) file to embed other files like PHP, ASP files? The following writers describe how to implement by iframe.
The function of the iframe element is in a document, creating a floating frame. Some of the properties are as follows:
Name: Inline Frame Name
Width: Inclusion Frame Width (available pixel value or percentage)
HEIGHT: Intriped frame height (available pixel value or percentage)
Frameborder: Inline frame border
MarginWidth: The left and right pages of intra text
Marginheight: The upper and lower page margins of intra text
Scrolling: Does the scroll bar appear ("auto" is automatic, "Yes" is displayed, "no" is not displayed)
SRC: The address of the in-file file
Style: The style of embedded documents (such as setting up document background, etc.)
ALLOWTRANSPARENCY: Whether it is allowed to be transparent
After understanding the above properties, we can implement the following code, displaying the contents of the SAMPER.htm file in main.htm in a height of 80, a width of 100%, and automatically displays the bound frame:
In the page load, please wait ...
Body>
Main file index2.htm
Body>
The content of first.htm will appear in your browser before the other content of the page is very simple? "Ctrl C", "CTRL V" once?
----------------------------------------------- Also give The author added: This iframe and the general Frame are also available as a Target submitted by Form. In addition, supplementing a point about iframe, it is also found together with Google and the last article, I hope not to scare everyone ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ -------------------------
IE IFRAME buffer overflow vulnerability: CNCERT / CC 2004-11-09 Security Vulnerability CN-VA04-111 Release Date: 2004-11-09 Vulnerability Type: Remote System Access Vulnerability Evaluation: High risk
Affected version:
Internet Explorer 6.0 On Windows XP SP1 (Fully Patch) Internet Explorer 6.0 On Windows 2000 (full patch)
Vulnerability Description:
This new vulnerability found in IE is caused by boundary errors when dealing with certain properties of the
In addition, other programs that use the WebBrowser Active X control will also be affected by this vulnerability, such as Outlook, Outlook Express, and Lotus Notes.
The vulnerability is very serious, and the vulnerability has been discovered online. In the laboratory test, the use of the code can be further propagated and stronger worm.
solution:
Windows XP SP 2 is not affected by the vulnerability.
Before Microsoft provides a comprehensive solution, please refer to the following comments:
1. Turn off the event script and ActiveX control:
Open the IE security settings, closing the active script and ActiveX controls in the Internet area and in the region will prevent the vulnerability. About How to close the activity scripts in the Internet area visible in Microsoft's "Malicious Web Scripts FAQ", information about protecting this region can refer to Microsoft Knowledge Base 833633. Windows XP (currently in RC1) SP2 includes security upgrades for IE related issues. Http://www.microsoft.com/technet/Winxpsp2.mspx2. Do not click on the links provided by access, do not click on the email, instant messaging, network forum or network relay chat channel (IRC) Unknown link.
3. Keep the updated anti-virus software can identify and defense some attacks, but it cannot be fully dependent on this.
4. Use another browser
Reference Information:
http://www.finjan.com/securityLAB/.../alert_show.asp?ttack_release_id=114
Http://www.cert.org.cn/Articles/...2004070521800.SHTML
Information provider:
Queen Star Active Defense Laboratory
Other Information:
CVE number: First release date: 2004-11-09 Repair number: 0
Vulnerability Report Documentation:
CNCERT / CC