"Al Gilman" <[EMAIL PROTECTED]>
If Jim Ley's tactic is already available to malware, aren't we closing the barn door
after the horse is gone, if we deny this functionality to the AT programs?

There's a difference - in my technique you change the JS exposed method to detect only author issued ones - other event listeners are not caught by the method so are either using an internal aEL or are all done before I have the opportunity to override the method (I can't tell which, but that's from testing) I can catch all author produced one though.

Cheers,

Jim.

Reply via email to