the_tdog opened this issue on Aug 20, 2008 ยท 111 posts
AnnieD posted Fri, 22 August 2008 at 8:25 PM
For anyone who is really interested in the way these things work...and which is more secure..how to protect your machine, etc.
**The malicious payload may be in the form of a Java applet, JavaScript, an ActiveX control, or any other form of executable content, which usually runs surreptitiously in the background.
**
Take your pick of articles
“For those who believe, no proof is necessary. For those who don't believe, no proof is possible.”
[Stuart Chase]