That doesn't allow them to use remotly linked avatars.
furthermore remotly linked avatars are a security issue in themself with out any valid way to check size (both file size and h&w) nor to veryfiy that its not a dynamic image of some sort of even some php script.
That doesn't allow them to use remotly linked avatars.
furthermore remotly linked avatars are a security issue in themself with out any valid way to check size (both file size and h&w) nor to veryfiy that its not a dynamic image of some sort of even some php script.
As I have said on vBulletin.com, IPB has the option to allow/dissalow dynamic images.
Furthermore, it resizes the images to the first border of your maximum dimentions, as specified in the ACP.
As I have said on vBulletin.com, IPB has the option to allow/dissalow dynamic images.
Furthermore, it resizes the images to the first border of your maximum dimentions, as specified in the ACP.
So then its increasing overhead load incredibly to meet some sort of false security?
Because to do that effectivly you'd need to check it on every occurnce of where it was going to be used on the page. Ontop of that, theres no saying that a remote image isn't dyanmic just because it has a .gif / jpg / png / bmp extension, webservers can be configurted to run .gif as a php extension
To do that on EVERY page load would be insane and a waste of system resources I'd think.
So then its increasing overhead load incredibly to meet some sort of false security?
Because to do that effectivly you'd need to check it on every occurnce of where it was going to be used on the page. Ontop of that, theres no saying that a remote image isn't dyanmic just because it has a .gif / jpg / png / bmp extension, webservers can be configurted to run .gif as a php extension
To do that on EVERY page load would be insane and a waste of system resources I'd think.
I dunno, man... You know IPB's has it since 1.2 and 3 years later, they havn't removed it... Must not be that much of a threat. :ermm: