Bart Z. Lederman wrote:
In article om, "ve3..." writes:
Steve wrote:
wrote:
The EBAY cheats seller the name, must look into, for the sake of the
safety, prevent from the beguilement;
http://web.59cn.cn/huaxia12345/ruparams.asp
I don't know about you guys, but I don't think I'll click on the above
link.
Steve
---------------------------------------------------------------------------------------
My sentiments exactly, but if anyone can figure out what the hell he is
talking about, let us know. In the meantime, DON'T CLICK.
I went to the link from a system where it is safe to do so (Mozilla
running on OpenVMS). Since the system can't run the file, it
downloads it as binary. I normally would expect an *.ASP file to
be a link to on-line video or something, but this wasn't.
It starts off as SCRIPT language=vbscript, but the rest is
unintellible. It ends with some sort of UnEncode function that
apparently goes through the contents and unpacks it in some way,
creating a document.
Some brave person with a disposable system might want to run it
to unpack it to see what it really is: but unless you know how
to take proper precautions, I second the previous comments not
to follow the link.
Bart.
I suspect that it's in some extended character
set, probably Chinese given the probable location of the web
site.
I ran it on one of my Macs (Tiger) and it opened a System Profile,
attempting to upload hardware and software configurations.
It wasn't successful at either the upload or the evaluation, but it
did access the profiling software without a hesitation.