473,396 Members | 2,026 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

</noscript> Issue

Does anyone know how to get around the </noscriptissue, were my HTML
editor refuses to save this tag?
Jan 25 '08 #1
28 2455
On Fri, 25 Jan 2008 01:18:35 +0100, FreeCopywritingTips
<da*********@sympatico.cawrote:
Does anyone know how to get around the </noscriptissue, were my HTML
editor refuses to save this tag?
Any decent text editor will have no trouble with it... So at least mention
which editor you use, and probably ask in a group/forum related to that
editor, as people are more likely to know the ins and outs of that
particular tool.
--
Rik Wasmus
Jan 25 '08 #2
Steve Swift wrote:
Wouldn't you add a:
<NOSCRIPT>This page works better with JavaScript enabled</NOSCRIPT>
though, when this was the case?
No. If someone has decided to disable JS, or is using a client which doesn't
support it, then constant reminders about it are going to be irritating.
--
David Dorward
http://dorward.me.uk/
http://blog.dorward.me.uk/
Jan 25 '08 #3
Scripsit Steve Swift:
Wouldn't you add a:
<NOSCRIPT>This page works better with JavaScript enabled</NOSCRIPT>
though, when this was the case?
No, I wouldn't write anything that foolish. At the minimum, I would tell
what the user gets, in terms of added functionality.
As you well know, my scripting is pathetic, so I use it only for
little flourishes that marginally improve the page's usability, so
such a statement is almost always true on my pages.
And virtually useless then. In human communication, useless easily turns
into harmful, since it distracts from the useful.
Incidentally, I work in a closed environment where scripting is on by
definition, and only off by the deviants.
Factually, this group is about WWW authoring, which is by definition not
a closed environment.
I recently saw someone suggesting to add some script that determined
if JavaScript was disabled. I'm still trying to figure this one out.
The world would be a much duller place without clueless people, wouldn't
it?

--
Jukka K. Korpela ("Yucca")
http://www.cs.tut.fi/~jkorpela/

Jan 25 '08 #4
On Fri, 25 Jan 2008, Steve Swift wrote:
Wouldn't you add a:
<NOSCRIPT>This page works better with JavaScript enabled</NOSCRIPT>
ALT="This page works better with images"

--
In memoriam Alan J. Flavell
http://groups.google.com/groups/sear...Alan.J.Flavell
Jan 25 '08 #5
On Fri, 25 Jan 2008, ao******@gmail.com wrote:
L. 508 Standards, Section 1194.22,
Did you know that there are countries other than the United States?

--
Top-posting.
What's the most irritating thing on Usenet?
Jan 25 '08 #6
On Jan 25, 9:45 am, Andreas Prilop <aprilop2...@trashmail.netwrote:
On Fri, 25 Jan 2008, aoksi...@gmail.com wrote:
L. 508 Standards, Section 1194.22,

Did you know that there are countries other than the United States?

--
Top-posting.
What's the most irritating thing on Usenet?
Duh, and your point is.

Daniel
Jan 25 '08 #7
On 25 Jan, 15:33, VK <schools_r...@yahoo.comwrote:
<FYI>
heavily outdated b.s. from early 90's
Oh VK, and you were doing so _well_! Yesterday you posted something
that was sensible and useful. Maybe it was just HipCrime?
Jan 25 '08 #8
On 25 Jan, 15:47, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
More info on 508 standards

http://www.access-board.gov/sec508/guide/1194.22.htm
A site which uses client-side JS to display a "disclaimer"!
http://www.access-board.gov/js/disclaimer.js

Noow _that's_ real genius!
Jan 25 '08 #9
Andy Dingley scribed:
>On 25 Jan, 15:47, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
>More info on 508 standards

http://www.access-board.gov/sec508/guide/1194.22.htm

A site which uses client-side JS to display a "disclaimer"!
http://www.access-board.gov/js/disclaimer.js

Noow _that's_ real genius!
'Noow,' _that's_ real genius. :-)))

Didn't you notice it's a government site? What did you expect? ;-) ;-)

--
Ed Jay (remove 'M' to respond by email)
Jan 25 '08 #10
ao******@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
Jan 25 '08 #11
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.

Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
You have to be kidding. If you need examples, visit
http://groups.google.com/group/stopbadware or http://www.stopbadware.org/home.

Daniel

http://a-ok-site.com
Jan 25 '08 #12
On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
>Internet is that it is a definite security hazard to the user if they
>have JavaScript enabled. There is a lot of malicious code on web
>sites that uses JavaScript to infect the user's computer with
>malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)

You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.org/home.

Daniel

http://a-ok-site.com
Sorry, I really thought you were kidding. But your post to the other
group http://groups.google.com/group/comp....ascript/topics shows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.

Daniel

http://a-ok-site.com
Jan 25 '08 #13
ao******@gmail.com scribed:
>On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
>On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)

You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.org/home.

Daniel

http://a-ok-site.com

Sorry, I really thought you were kidding. But your post to the other
group http://groups.google.com/group/comp....ascript/topics shows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.
You have good eyes, but my post to the js group is intended to start a
discussion, not to answer the base question. As I said in my query there, I
believe your statement to be false, i.e., js cannot be used to infect a
user's machine without the user's express permission.

I checked the stopbadware group. They're not talking about js being used to
infect a user's machine. They're talking about js being injected into
existing sites (hacking). They talk about badware on a user's machine, but
that badware has to be downloaded and executed, e.g., an attachment, exe
file, or packaged clandestinely with another application.

AFAIK, your statement is an artifact from years past when it was incorrectly
propagated that js was a security risk. It isn't (afaik).
--
Ed Jay (remove 'M' to respond by email)
Jan 25 '08 #14
On Jan 25, 1:53 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
>Internet is that it is a definite security hazard to the user if they
>have JavaScript enabled. There is a lot of malicious code on web
>sites that uses JavaScript to infect the user's computer with
>malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.or....
Daniel
>http://a-ok-site.com
Sorry, I really thought you were kidding. But your post to the other
grouphttp://groups.google.com/group/comp.lang.javascript/topicsshows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.

You have good eyes, but my post to the js group is intended to start a
discussion, not to answer the base question. As I said in my query there, I
believe your statement to be false, i.e., js cannot be used to infect a
user's machine without the user's express permission.

I checked the stopbadware group. They're not talking about js being used to
infect a user's machine. They're talking about js being injected into
existing sites (hacking). They talk about badware on a user's machine, but
that badware has to be downloaded and executed, e.g., an attachment, exe
file, or packaged clandestinely with another application.

AFAIK, your statement is an artifact from years past when it was incorrectly
propagated that js was a security risk. It isn't (afaik).
--
Ed Jay (remove 'M' to respond by email)
It seems funny to me that Google is flagging the web sites as
containing malicious code and that they may cause harm to your
computer.

Daniel

http://a-ok-site.com
Jan 25 '08 #15
ao******@gmail.com scribed:
>On Jan 25, 1:53 pm, Ed Jay <ed...@aes-intl.comwrote:
>aoksi...@gmail.com scribed:
>On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
>You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.or....
>Daniel
>>http://a-ok-site.com
>Sorry, I really thought you were kidding. But your post to the other
grouphttp://groups.google.com/group/comp.lang.javascript/topicsshows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.

You have good eyes, but my post to the js group is intended to start a
discussion, not to answer the base question. As I said in my query there, I
believe your statement to be false, i.e., js cannot be used to infect a
user's machine without the user's express permission.

I checked the stopbadware group. They're not talking about js being used to
infect a user's machine. They're talking about js being injected into
existing sites (hacking). They talk about badware on a user's machine, but
that badware has to be downloaded and executed, e.g., an attachment, exe
file, or packaged clandestinely with another application.

AFAIK, your statement is an artifact from years past when it was incorrectly
propagated that js was a security risk. It isn't (afaik).
--
Ed Jay (remove 'M' to respond by email)

It seems funny to me that Google is flagging the web sites as
containing malicious code and that they may cause harm to your
computer.
Citation please, because that's not what they are saying.
--
Ed Jay (remove 'M' to respond by email)
Jan 25 '08 #16
On Jan 25, 2:04 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
On Jan 25, 1:53 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
>Internet is that it is a definite security hazard to the user if they
>have JavaScript enabled. There is a lot of malicious code on web
>sites that uses JavaScript to infect the user's computer with
>malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.or....
Daniel
>http://a-ok-site.com
Sorry, I really thought you were kidding. But your post to the other
grouphttp://groups.google.com/group/comp.lang.javascript/topicsshows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.
You have good eyes, but my post to the js group is intended to start a
discussion, not to answer the base question. As I said in my query there, I
believe your statement to be false, i.e., js cannot be used to infect a
user's machine without the user's express permission.
I checked the stopbadware group. They're not talking about js being used to
infect a user's machine. They're talking about js being injected into
existing sites (hacking). They talk about badware on a user's machine, but
that badware has to be downloaded and executed, e.g., an attachment, exe
file, or packaged clandestinely with another application.
AFAIK, your statement is an artifact from years past when it was incorrectly
propagated that js was a security risk. It isn't (afaik).
--
Ed Jay (remove 'M' to respond by email)
It seems funny to me that Google is flagging the web sites as
containing malicious code and that they may cause harm to your
computer.

Citation please, because that's not what they are saying.
--
Ed Jay (remove 'M' to respond by email)
For the people who accept new info here is one link to a direct
infection caused by JavaScript http://groups.google.com/group/stopb...4187b832224f51
there are many more.

Daniel

http://a-ok-site.com
Jan 25 '08 #17
On Jan 25, 2:22 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 2:04 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>On Jan 25, 1:53 pm, Ed Jay <ed...@aes-intl.comwrote:
>aoksi...@gmail.com scribed:
>On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
>On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
>Internet is that it is a definite security hazard to the user if they
>have JavaScript enabled. There is a lot of malicious code on web
>sites that uses JavaScript to infect the user's computer with
>malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
>You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.or....
>Daniel
>>http://a-ok-site.com
>Sorry, I really thought you were kidding. But your post to the other
>grouphttp://groups.google.com/group/comp.lang.javascript/topicsshows
>you weren't. Take some time and check out the stopbadware group it
>has a lot of great info.
>You have good eyes, but my post to the js group is intended to start a
>discussion, not to answer the base question. As I said in my query there, I
>believe your statement to be false, i.e., js cannot be used to infect a
>user's machine without the user's express permission.
>I checked the stopbadware group. They're not talking about js being used to
>infect a user's machine. They're talking about js being injected into
>existing sites (hacking). They talk about badware on a user's machine, but
>that badware has to be downloaded and executed, e.g., an attachment, exe
>file, or packaged clandestinely with another application.
>AFAIK, your statement is an artifact from years past when it was incorrectly
>propagated that js was a security risk. It isn't (afaik).
>--
>Ed Jay (remove 'M' to respond by email)
>It seems funny to me that Google is flagging the web sites as
>containing malicious code and that they may cause harm to your
>computer.
Citation please, because that's not what they are saying.
--
Ed Jay (remove 'M' to respond by email)

For the people who accept new info here is one link to a direct
infection caused by JavaScripthttp://groups.google.com/group/stopbadware/browse_thread/thread/5d418...
there are many more.

Daniel

http://a-ok-site.com
And another from a different source
http://www.trendmicro.com/vinfo/viru...E%2EAQ&VSect=P

Daniel

http://a-ok-site.com
Jan 25 '08 #18
ao******@gmail.com scribed:
>On Jan 25, 2:04 pm, Ed Jay <ed...@aes-intl.comwrote:
>aoksi...@gmail.com scribed:
>On Jan 25, 1:53 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
>You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.or....
>Daniel
>>http://a-ok-site.com
>Sorry, I really thought you were kidding. But your post to the other
grouphttp://groups.google.com/group/comp.lang.javascript/topicsshows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.
>You have good eyes, but my post to the js group is intended to start a
discussion, not to answer the base question. As I said in my query there, I
believe your statement to be false, i.e., js cannot be used to infect a
user's machine without the user's express permission.
>I checked the stopbadware group. They're not talking about js being used to
infect a user's machine. They're talking about js being injected into
existing sites (hacking). They talk about badware on a user's machine, but
that badware has to be downloaded and executed, e.g., an attachment, exe
file, or packaged clandestinely with another application.
>AFAIK, your statement is an artifact from years past when it was incorrectly
propagated that js was a security risk. It isn't (afaik).
--
Ed Jay (remove 'M' to respond by email)
>It seems funny to me that Google is flagging the web sites as
containing malicious code and that they may cause harm to your
computer.

Citation please, because that's not what they are saying.
--
Ed Jay (remove 'M' to respond by email)

For the people who accept new info here is one link to a direct
infection caused by JavaScript http://groups.google.com/group/stopb...4187b832224f51
there are many more.
New info? LMAO! The thread is about an infected WEB SITE, not a User's
computer!!! :-))

This 'debate' is exactly why things that should not need to be debated
anymore continue to be debated. Because no matter how many facts you place
in front of someone, no matter how many beliefs are proven to be
nonsensical, they remain intractable and hold on to their false memes...and
add to them. When they are trapped by the facts, they refuse to admit they
were mistaken, and instead resort to ad hominem attacks.
--
Ed Jay (remove 'M' to respond by email)
Jan 25 '08 #19
On Jan 25, 3:11 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
On Jan 25, 2:04 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
On Jan 25, 1:53 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
>Internet is that it is a definite security hazard to the user if they
>have JavaScript enabled. There is a lot of malicious code on web
>sites that uses JavaScript to infect the user's computer with
>malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.or....
Daniel
>http://a-ok-site.com
Sorry, I really thought you were kidding. But your post to the other
grouphttp://groups.google.com/group/comp.lang.javascript/topicsshows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.
You have good eyes, but my post to the js group is intended to start a
discussion, not to answer the base question. As I said in my query there, I
believe your statement to be false, i.e., js cannot be used to infect a
user's machine without the user's express permission.
I checked the stopbadware group. They're not talking about js being used to
infect a user's machine. They're talking about js being injected into
existing sites (hacking). They talk about badware on a user's machine, but
that badware has to be downloaded and executed, e.g., an attachment, exe
file, or packaged clandestinely with another application.
AFAIK, your statement is an artifact from years past when it was incorrectly
propagated that js was a security risk. It isn't (afaik).
--
Ed Jay (remove 'M' to respond by email)
It seems funny to me that Google is flagging the web sites as
containing malicious code and that they may cause harm to your
computer.
Citation please, because that's not what they are saying.
--
Ed Jay (remove 'M' to respond by email)
For the people who accept new info here is one link to a direct
infection caused by JavaScripthttp://groups.google.com/group/stopbadware/browse_thread/thread/5d418...
there are many more.

New info? LMAO! The thread is about an infected WEB SITE, not a User's
computer!!! :-))

This 'debate' is exactly why things that should not need to be debated
anymore continue to be debated. Because no matter how many facts you place
in front of someone, no matter how many beliefs are proven to be
nonsensical, they remain intractable and hold on to their false memes...and
add to them. When they are trapped by the facts, they refuse to admit they
were mistaken, and instead resort to ad hominem attacks.
--
Ed Jay (remove 'M' to respond by email)
You really are an idiot if you think that it is not affecting the
user's computer. There is one person mistaken here and it is you.

Daniel
Jan 25 '08 #20
ao******@gmail.com scribed:
>On Jan 25, 3:11 pm, Ed Jay <ed...@aes-intl.comwrote:
>aoksi...@gmail.com scribed:
>On Jan 25, 2:04 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>On Jan 25, 1:53 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>On Jan 25, 1:35 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
On Jan 25, 1:21 pm, Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
>One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
--
Ed Jay (remove 'M' to respond by email)
>You have to be kidding. If you need examples, visithttp://groups.google.com/group/stopbadwareorhttp://www.stopbadware.or....
>Daniel
>>http://a-ok-site.com
>Sorry, I really thought you were kidding. But your post to the other
grouphttp://groups.google.com/group/comp.lang.javascript/topicsshows
you weren't. Take some time and check out the stopbadware group it
has a lot of great info.
>You have good eyes, but my post to the js group is intended to start a
discussion, not to answer the base question. As I said in my query there, I
believe your statement to be false, i.e., js cannot be used to infect a
user's machine without the user's express permission.
>I checked the stopbadware group. They're not talking about js being used to
infect a user's machine. They're talking about js being injected into
existing sites (hacking). They talk about badware on a user's machine, but
that badware has to be downloaded and executed, e.g., an attachment, exe
file, or packaged clandestinely with another application.
>AFAIK, your statement is an artifact from years past when it was incorrectly
propagated that js was a security risk. It isn't (afaik).
--
Ed Jay (remove 'M' to respond by email)
>It seems funny to me that Google is flagging the web sites as
containing malicious code and that they may cause harm to your
computer.
>Citation please, because that's not what they are saying.
--
Ed Jay (remove 'M' to respond by email)
>For the people who accept new info here is one link to a direct
infection caused by JavaScripthttp://groups.google.com/group/stopbadware/browse_thread/thread/5d418...
there are many more.

New info? LMAO! The thread is about an infected WEB SITE, not a User's
computer!!! :-))

This 'debate' is exactly why things that should not need to be debated
anymore continue to be debated. Because no matter how many facts you place
in front of someone, no matter how many beliefs are proven to be
nonsensical, they remain intractable and hold on to their false memes...and
add to them. When they are trapped by the facts, they refuse to admit they
were mistaken, and instead resort to ad hominem attacks.
You really are an idiot
Thank you for illustrating my point.
if you think that it is not affecting the
user's computer. There is one person mistaken here and it is you.
Yawn. My last post in response to your inability to comprehend what you are
reading.
--
Ed Jay (remove 'M' to respond by email)
Jan 25 '08 #21
Ed Jay wrote:
ao******@gmail.com scribed:
>Ed Jay <ed...@aes-intl.comwrote:
>>aoksi...@gmail.com scribed:

For the people who accept new info here is one link to a direct
infection caused by JavaScript
http://groups.google.com/group/stopb...4187b832224f51
there are many more.
New info? LMAO! The thread is about an infected WEB SITE, not a User's
computer!!! :-))
I just read the stopbadware thread listed above, and it sure looks to me
as if it is about the hacking of web sites - *which in turn* - infect
the computers of visitors with inferior browsers and JavaScript enabled.

--
-bts
-No, I haven't been following this entire </noscriptthread
Jan 25 '08 #22
On Jan 25, 3:57 pm, "Beauregard T. Shagnasty"
<a.nony.m...@example.invalidwrote:
Ed Jay wrote:
aoksi...@gmail.com scribed:
Ed Jay <ed...@aes-intl.comwrote:
aoksi...@gmail.com scribed:
For the people who accept new info here is one link to a direct
infection caused by JavaScript
http://groups.google.com/group/stopb...d/thread/5d418...
there are many more.
New info? LMAO! The thread is about an infected WEB SITE, not a User's
computer!!! :-))

I just read the stopbadware thread listed above, and it sure looks to me
as if it is about the hacking of web sites - *which in turn* - infect
the computers of visitors with inferior browsers and JavaScript enabled.

--
-bts
-No, I haven't been following this entire </noscriptthread
Thank you.

Daniel
Jan 25 '08 #23
VK
On Jan 25, 6:41 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
The previous posts are ridiculous and made by people that have little
or knowledge of valid coding of web pages, so the OP needs to
disregard their posts and follow accepted procedures.
Kindly asking to keep you mouth shut until there is something wise to
say.
L. 508 Standards, Section 1194.22
Before quoting any law it is wide to check what kind of law is that
and to what domain does it apply. I already explained in this NG the
508 hoax several times, but maybe it is time to do once again:

"Section 508 requires that Federal agencies' electronic and
information technology is accessible to people with disabilities. IT
Accessibility & Workforce Division, in the U.S. General Services
Administration's Office of Governmentwide Policy, has been charged
with the task of educating Federal employees and building the
infrastructure necessary to support Section 508 implementation. Using
this web site, Federal employees and the public can access resources
for understanding and implementing the requirements of Section 508."
(http://www.section508.gov)

Can you see any difference between a federal US facility and a dotcom
site? I guess not.
Jan 26 '08 #24
On Jan 26, 11:10 am, VK <schools_r...@yahoo.comwrote:
On Jan 25, 6:41 pm, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
The previous posts are ridiculous and made by people that have little
or knowledge of valid coding of web pages, so the OP needs to
disregard their posts and follow accepted procedures.

Kindly asking to keep you mouth shut until there is something wise to
say.
L. 508 Standards, Section 1194.22

Before quoting any law it is wide to check what kind of law is that
and to what domain does it apply. I already explained in this NG the
508 hoax several times, but maybe it is time to do once again:

"Section 508 requires that Federal agencies' electronic and
information technology is accessible to people with disabilities. IT
Accessibility & Workforce Division, in the U.S. General Services
Administration's Office of Governmentwide Policy, has been charged
with the task of educating Federal employees and building the
infrastructure necessary to support Section 508 implementation. Using
this web site, Federal employees and the public can access resources
for understanding and implementing the requirements of Section 508."
(http://www.section508.gov)

Can you see any difference between a federal US facility and a dotcom
site? I guess not.
Kindly BM

Daniel
Jan 26 '08 #25
On Jan 25, 12:33 pm, Andy Dingley <ding...@codesmiths.comwrote:
On 25 Jan, 15:47, "aoksi...@gmail.com" <aoksi...@gmail.comwrote:
More info on 508 standards
http://www.access-board.gov/sec508/guide/1194.22.htm

A site which uses client-side JS to display a "disclaimer"!http://www.access-board.gov/js/disclaimer.js

Noow _that's_ real genius!

The real genius would be to figure how the hell somebody as stupid as
you makes it in the world.
Jan 29 '08 #26
On Fri, 25 Jan 2008 11:21:12 -0800, Ed Jay wrote:
ao******@gmail.com scribed:
>>One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.
Search for "Javascript" on <http://secunia.com/search/>
and similar sites. Some examples (note the proposed
solution in the first one):
<http://secunia.com/advisories/27427/>:

"Description:
Sun has acknowledged some vulnerabilities in Mozilla 1.7 for
Sun Solaris, which potentially can be exploited by malicious
people to compromise a user's system.
...
Solution:
The vendor recommends disabling the JavaScript support. Please
see the vendor's advisory for details."
<http://secunia.com/advisories/26477/>:

"Description:
A vulnerability has been reported in Opera, which potentially
can be exploited by malicious people to compromise a user's
system.

The vulnerability is caused due to an unspecified error when
processing JavaScript code and can result in a virtual function
call using an invalid pointer. This can be exploited to execute
arbitrary code by e.g. tricking a user into visiting a malicious
website."
<http://secunia.com/advisories/26287/>:

"Description:
Some vulnerabilities have been reported in Apple iPhone, which
can be exploited by malicious people to conduct cross-site
scripting and spoofing attacks, and potentially to compromise
a vulnerable system.
...
2) A boundary error in the Perl Compatible Regular Expressions
(PCRE) library used by the Javascript engine in Safari can be
exploited to cause a heap-based buffer overflow when a user
visits a malicious web page.

Successful exploitation may allow execution of arbitrary code."
/Nisse
Jan 29 '08 #27
Nisse Engström scribed:
>On Fri, 25 Jan 2008 11:21:12 -0800, Ed Jay wrote:
>ao******@gmail.com scribed:
>>>One significant reason for disabling JavaScript when browsing the
Internet is that it is a definite security hazard to the user if they
have JavaScript enabled. There is a lot of malicious code on web
sites that uses JavaScript to infect the user's computer with
malicious code.
Please elaborate by providing an example of how js can be used to compromise
a user's computer with malicious code.

Search for "Javascript" on <http://secunia.com/search/>
and similar sites. Some examples (note the proposed
solution in the first one):
<http://secunia.com/advisories/27427/>:

"Description:
Sun has acknowledged some vulnerabilities in Mozilla 1.7 for
Sun Solaris, which potentially can be exploited by malicious
people to compromise a user's system.
...
Solution:
The vendor recommends disabling the JavaScript support. Please
see the vendor's advisory for details."
<http://secunia.com/advisories/26477/>:

"Description:
A vulnerability has been reported in Opera, which potentially
can be exploited by malicious people to compromise a user's
system.

The vulnerability is caused due to an unspecified error when
processing JavaScript code and can result in a virtual function
call using an invalid pointer. This can be exploited to execute
arbitrary code by e.g. tricking a user into visiting a malicious
website."
<http://secunia.com/advisories/26287/>:

"Description:
Some vulnerabilities have been reported in Apple iPhone, which
can be exploited by malicious people to conduct cross-site
scripting and spoofing attacks, and potentially to compromise
a vulnerable system.
...
2) A boundary error in the Perl Compatible Regular Expressions
(PCRE) library used by the Javascript engine in Safari can be
exploited to cause a heap-based buffer overflow when a user
visits a malicious web page.

Successful exploitation may allow execution of arbitrary code."
Compromised integrity due to vulnerabilities, i.e., security holes, in
browsers are not the fault of javascript.
--
Ed Jay (remove 'M' to respond by email)
Jan 29 '08 #28
Ed Jay <ed***@aes-intl.comwrites:
Compromised integrity due to vulnerabilities, i.e., security holes, in
browsers are not the fault of javascript.
Compare this to lying on a road in the middle of the night wearing
dark clothing. You might get hit by a car or two, but that means that
cars are dangerous, not the road. Nevertheless, sensible people rarely
lie down on roads.

If you have to disable your browser's Javascript interpreter because
it has security bugs (and the record suggests that the interpreters in
all major browsers are likely to contain significant undiscovered
bugs) that a malicious site might use to take over your computer, then
the fact that the Javascript itself is perfectly safe is irrelevant.

--
Chris
Jan 29 '08 #29

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Gustav Medler | last post by:
Hello, there is a known problem with Opera and the execution of content shown in <NOSCRIPT> tag. Everythings works fine, if there is only one simple script like:...
2
by: llaxman | last post by:
Hello everyone, I was wondering if anyone can help me? I am having some problems wit the <noscript> tag. I actually use it to block banner advertisements from being displaye in my website. I...
12
by: Burton Figg | last post by:
My homepage, www.jimpix.co.uk uses transitional XHTML. The whole thing validates except one line: <noscript><img height="1" width="1" alt=""...
13
by: Paul | last post by:
Hello: I read the FAQ about embedding HTML code in a Javascript. I have used the "<\/tag>" format to get around validator problems. Now the <NOSCRIPT> block is failing with error #65: 1. ...
7
by: Spartanicus | last post by:
Afaik the use of a <noscriptelement is frowned upon nowadays. For a JS random image changer I tried to use a replacement by having the script change the HTML src attribute value of an img element....
3
by: ajay2552 | last post by:
Hi, I have a query. All html tags start with < and end with >. Suppose i want to display either '<' or '>' or say some text like '<Company>' in html how do i do it? One method is to use &lt,...
1
by: Gretsch | last post by:
I have a lot of nicely formatted HTML to be displayed for visitors WITHOUT script (/enabled), and a second set of HTML for those WITH script. The <noscript> tag allows me to separate the HTML for...
4
by: phpmel | last post by:
<%@ Page Language="C#" %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <script language="JavaScript"...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.