45 coaches online • Server time: 01:02
* * * Did you know? Up until now, 1270393 players have died on the pitch.
Log in
Recent Forum Topics goto Post The Best Time is Now...goto Post CBFL on CBSgoto Post SWL Season LXXVII
Garion
Last seen 6 hours ago
Halfling
Legend
Halfling
Record
138/61/83
Win Percentage
60%
Elven Union
Legend
Elven Union
Record
44/7/7
Win Percentage
82%
Overall
[R]
Legend
Overall
Record
572/202/274
Win Percentage
64%
Archive

2019

2019-06-25 10:47:43
rating 4.9
2019-06-25 10:45:46
rating 4.3

2018

2018-10-30 18:28:20
rating 5.6
2018-10-28 19:22:08
rating 6
2018-08-02 16:58:17
rating 5.2

2017

2017-07-02 17:50:17
rating 5.4
2017-06-07 20:18:15
rating 5.4
2017-05-04 20:13:27
rating 5.6

2016

2016-08-24 20:42:57
rating 4.8
2016-08-03 20:39:46
rating 5.2
2016-07-31 13:03:50
rating 6
2016-07-20 16:54:06
rating 5.7
2016-07-05 13:50:28
rating 5.6
2016-07-02 14:00:56
rating 5.2
2016-06-30 09:41:16
rating 5.5
2016-06-23 20:46:56
rating 5.8
2016-06-22 14:32:22
rating 5.7
2016-06-21 18:54:06
rating 5.7

2014

2014-11-25 16:48:21
rating 6
2014-10-01 15:45:39
rating 5.4
2014-09-25 23:25:17
rating 4.8
2014-09-25 13:16:34
rating 5.6
2014-07-01 22:15:06
rating 5.5
2014-06-18 15:36:32
rating 5.6
2014-05-17 18:29:20
rating 5.6
2014-05-15 20:16:51
rating 5.4
2014-05-07 20:32:48
rating 6
2014-05-07 10:17:52
rating 6
2014-04-04 10:06:59
rating 5.6
2014-03-24 14:55:20
rating 4.1
2014-03-15 12:36:09
rating 5

2013

2013-12-06 20:33:20
rating 3.3
2013-12-06 18:36:54
rating 3
2013-09-04 12:19:37
rating 5.6
2013-06-01 17:28:33
rating 5.6
2013-03-20 17:51:56
rating 4.1

2011

2011-04-15 20:01:01
rating 5.7
2011-03-15 09:11:49
rating 5.6
2014-05-07 10:17:52
7 votes, rating 6
Copy and Paste in Client Chat
I was asked to blog this so people could find it easily.

If you want to copy and paste in the clients chat window just follow the instructions here - http://www.shodor.org/interactivate/resources/InstructionsCopyPaste/

Thank you to Wreckage for being the person who found this out originally. :)

Edit : added Christers post about potential security risks here, so you don't miss it -

The security risk is that you may have a document where you store your various passwords for all sorts of websites (banking, email, etc). Because you are security aware, these passwords are long and gnarly. You're also very efficient in nature and don't want to waste time by retyping these passwords into your web browser, so you have a habit of copy/pasting the passwords from your document into the site password field.

Now, with this policy change you just did, a malicious java applet (which could be a banner ad in another browser window or another browser entirely) will have the ability to access that password you just copied.

Now, this isn't very far fetched either, and it's quite possible that there are malicious applets out there that do just this. So if you decide to go ahead with the policy change, be aware that there is a real security risk in doing so and act accordingly. One example could be to make sure that no Java applets are allowed to run in your browser (which you should do regardless), for example by disabling the java extension in your browser of choice.
Rate this entry
Comments
Posted by bghandras on 2014-05-07 11:05:12
I was told this poses some security risk. Not sure why, but if there is any IT expert, then please elaborate.
Posted by Garion on 2014-05-07 11:11:59
interesting, that would be good to know.
Posted by the_Sage on 2014-05-07 11:16:06
I was told this too; do not recall by whom. I did do this trick, and found it very helpful =)
Posted by Overhamsteren on 2014-05-07 12:04:51
Copy'n'Paste dat RAGE!!!
Posted by Christer on 2014-05-07 16:33:16
What this does is that it allows any Java application to access your system clipboard, meaning a java application has the ability to see everything you copy/paste.

The security risk is that you may have a document where you store your various passwords for all sorts of websites (banking, email, etc). Because you are security aware, these passwords are long and gnarly. You're also very efficient in nature and don't want to waste time by retyping these passwords into your web browser, so you have a habit of copy/pasting the passwords from your document into the site password field.

Now, with this policy change you just did, a malicious java applet (which could be a banner ad in another browser window or another browser entirely) will have the ability to access that password you just copied.

Now, this isn't very far fetched either, and it's quite possible that there are malicious applets out there that do just this. So if you decide to go ahead with the policy change, be aware that there is a real security risk in doing so and act accordingly. One example could be to make sure that no Java applets are allowed to run in your browser (which you should do regardless), for example by disabling the java extension in your browser of choice.
Posted by mrt1212 on 2014-05-07 17:45:05
Christer knows whats up with secuirity.
Posted by Jeffro on 2014-05-07 18:04:39
Rated 6 for Christer Latin' down some knowledgez.
Posted by bobafettsmum on 2014-05-07 18:47:16
I looked at the instructions and decided this is too much hassle anyway. No security risk for me!!! :-D
Posted by Balle2000 on 2014-05-07 19:51:34
What happens in Vegas, stays in Vegas. And Blood Bowl. So don't copy and tell.
Posted by Wreckage on 2014-05-08 18:45:37
These days java is deactivated on default in most browsers. Whenever there is a java application you have to actually click it for it to run.

I don't really see how a banner could circumvent or even work like this.

My question would be if there is some way for a malicious java tool to circumvent this?