Wait, you hid a .exe file in a .ppt file, and had the user download the .ppt file which upon opening opens a .exe file?
Sounds to me like you're trying pretty damn hard to exploit vulnerabilities in IE/Firefox/Chrome and resorting to exploiting vulnerabilities in powerpoint instead. Whilst I'm glad that this is proving tricky for you, I have to say that posting a question regarding how to exploit software on a development mailing list has labelled you as quite a few ranks below your common-or-garden script kiddie... Thus, you aren't even a threat if you DO succeed in exploiting powerpoint, firefox, chrome or internet explorer. Still, posting helpful advice for you without knowing that your intent is legitimate (I have made the assumption that it is not, based upon the lack of evidence to the contrary) would be dangerous as a more threatening adversary could get hold of this advice (it's posted on a public mailing list) and use it in a more dangerous fashion than you intend (or are capable of). Basically, you're looking in the wrong place for help if you want to crack stuff. If you can provide a legitimate reason for what you want to do, I (and many others) can help you build a solution that doesn't have any knock-on effect to the user's security. I am also intrigued to know just how you managed to get such a solution working in Firefox, so I will be watching this thread intently. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Chromium-discuss" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/chromium-discuss?hl=en -~----------~----~----~----~------~----~------~--~---
