<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: Методи захисту від ClickJacking</title>
	<link>http://websecurity.com.ua/5538/</link>
	<description></description>
	<pubDate>Sun, 19 Apr 2026 18:51:00 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/5538/#comment-386302</link>
		<pubDate>Tue, 06 Dec 2011 23:53:55 +0000</pubDate>
		<guid>http://websecurity.com.ua/5538/#comment-386302</guid>
					<description>&lt;strong&gt;Felix&lt;/strong&gt;

I've based my article about different ClickJacking protecting methods on the list in Wikipedia's article about &lt;a href="http://en.wikipedia.org/wiki/Clickjacking" target="_blank" rel="nofollow"&gt;Clickjacking&lt;/a&gt;. Which I've mentioned about in 2010 at my site, and after I've recently wrote detailed article about X-Frame-Options header, I've also decided to make an article with the list of all main methods of protecting against ClickJacking.

Thanks for information. I haven't work with Ghostery. But because your software is mentioned in that list as one protection method, I've mentioned about it. So as from your words, as from words in Wikipedia's article, it looks like your software is "limited ClickJacking protection solution". But at that it's not a security product (and I've wrote about different protection methods, regardless is it security or other product).</description>
		<content:encoded><![CDATA[<p><strong>Felix</strong></p>
<p>I&#8217;ve based my article about different ClickJacking protecting methods on the list in Wikipedia&#8217;s article about <a href="http://en.wikipedia.org/wiki/Clickjacking" target="_blank" rel="nofollow">Clickjacking</a>. Which I&#8217;ve mentioned about in 2010 at my site, and after I&#8217;ve recently wrote detailed article about X-Frame-Options header, I&#8217;ve also decided to make an article with the list of all main methods of protecting against ClickJacking.</p>
<p>Thanks for information. I haven&#8217;t work with Ghostery. But because your software is mentioned in that list as one protection method, I&#8217;ve mentioned about it. So as from your words, as from words in Wikipedia&#8217;s article, it looks like your software is &#8220;limited ClickJacking protection solution&#8221;. But at that it&#8217;s not a security product (and I&#8217;ve wrote about different protection methods, regardless is it security or other product).
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Felix</title>
		<link>http://websecurity.com.ua/5538/#comment-386259</link>
		<pubDate>Tue, 06 Dec 2011 20:59:43 +0000</pubDate>
		<guid>http://websecurity.com.ua/5538/#comment-386259</guid>
					<description>Hi!

Ghostery does not prevent click-jacking attacks.  Ghostery is a privacy product, and thats the type of defense it offers: we maintain a list of known privacy applications that are embedded into sites and are known to track users.  Some of the entries are indeed click-jacking violators, but its not a security product like NoScript.</description>
		<content:encoded><![CDATA[<p>Hi!</p>
<p>Ghostery does not prevent click-jacking attacks.  Ghostery is a privacy product, and thats the type of defense it offers: we maintain a list of known privacy applications that are embedded into sites and are known to track users.  Some of the entries are indeed click-jacking violators, but its not a security product like NoScript.
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
