Our very own Jim Ley is famous. Or maybe I should say infamous:
<url: http://www.infoworld.com/article/04/...Ngoogle_1.html
/>
I especially like the line: 'Malicious hackers could trigger the
vulnerability using a Google custom search form, or even through
a customized HTML (Hypertext Markup Language) link, by feeding
Google's servers computer script instead of an image URL,
according to the notice's author, who used the name "Jim Ley."'
Do you have a habit of using other names Jim?
:D