*on* mouseUp
*local* js_do
*put* "document.getElementById('email').value='mylogin'" into js_do
*do* js_do in widget "Browser 1"
*put* "document.getElementById('pass').value='mypass'" into js_do
*do* js_do in widget "Browser 1"
*put* "document.getElementById('login_form').submit();" into js_do
http://runtime-revolution.278305.n4.nabble.com/Browser-Widget-HTML5-LC-Integration-td4712003.html
On Tue, Jul 31, 2018 at 4:06 PM, Tom Glod wrote:
> Yeah. cool.thanks for that .I figured as much ,, it would
> make sense why these kinds of protections would exist but imagi
Yeah. cool.thanks for that .I figured as much ,, it would
make sense why these kinds of protections would exist but imagine
what could be done without them...lol
So how bout those cookies? for the browser? is there any possible
workaround to log into twitter or faceboo
I'm going to say that Javascript is written to prevent you from doing that.
Javascript sandboxes their commands and functions so that only certain ones are
visible from outside the applications "sandbox". They call it Scope and
Context.
Here is a good article on it which helped me understand w