| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | It`s Alive!! It`s Alive! |
WC> As do I per your recommendations. WC> Still during a google search I hit a site which breached WC> security. I was looking for source for a shareware game to WC> test my reflexes after a recent incident and up came a site WC> promoting Warez :-( WC> Repeated attempts to close the browser failed as it kept WC> reopening :-( I killed the dialer to eliminate that threat WC> then deleted Win temp files. WC> No idea how this clown's code breached my system. quite simply, it didn't... it most likely used the standard "onwindowopen()" and "onwindowclose()" functions to (re)open itself... this is the same stuff that some sites use to do their popups and popunders... )\/(ark* Origin: (1:3634/12) SEEN-BY: 633/267 270 @PATH: 3634/12 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.