"Al Gilman" <[EMAIL PROTECTED]>
If Jim Ley's tactic is already available to malware, aren't we closing the
barn door
after the horse is gone, if we deny this functionality to the AT programs?
There's a difference - in my technique you change the JS exposed method to
detect only author issued ones - other event listeners are not caught by the
method so are either using an internal aEL or are all done before I have the
opportunity to override the method (I can't tell which, but that's from
testing) I can catch all author produced one though.
Cheers,
Jim.