TIP: Click on subject to list as thread! ANSI
echo: tech
to: Wayne Chirnside
from: mark lewis
date: 2004-03-02 11:22:58
subject: It`s Alive!! It`s Alive!

WC> As do I per your recommendations.
 WC> Still during a google search I hit a site which breached
 WC> security. I was looking for source for a shareware game to
 WC> test my reflexes after a recent incident and up came a site
 WC> promoting Warez :-(
 WC> Repeated attempts to close the browser failed as it kept
 WC> reopening :-( I killed the dialer to eliminate that threat
 WC> then deleted Win temp files.

 WC> No idea how this clown's code breached my system.

quite simply, it didn't... it most likely used the standard
"onwindowopen()" and "onwindowclose()" functions to
(re)open itself... this is the same stuff that some sites use to do their
popups and popunders...

)\/(ark

* Origin: (1:3634/12)
SEEN-BY: 633/267 270
@PATH: 3634/12 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.