Home |
Search |
Today's Posts |
#6
![]() |
|||
|
|||
![]()
Bart Z. Lederman wrote:
In article om, "ve3..." writes: Steve wrote: wrote: The EBAY cheats seller the name, must look into, for the sake of the safety, prevent from the beguilement; http://web.59cn.cn/huaxia12345/ruparams.asp I don't know about you guys, but I don't think I'll click on the above link. Steve --------------------------------------------------------------------------------------- My sentiments exactly, but if anyone can figure out what the hell he is talking about, let us know. In the meantime, DON'T CLICK. I went to the link from a system where it is safe to do so (Mozilla running on OpenVMS). Since the system can't run the file, it downloads it as binary. I normally would expect an *.ASP file to be a link to on-line video or something, but this wasn't. It starts off as SCRIPT language=vbscript, but the rest is unintellible. It ends with some sort of UnEncode function that apparently goes through the contents and unpacks it in some way, creating a document. Some brave person with a disposable system might want to run it to unpack it to see what it really is: but unless you know how to take proper precautions, I second the previous comments not to follow the link. Bart. I suspect that it's in some extended character set, probably Chinese given the probable location of the web site. I ran it on one of my Macs (Tiger) and it opened a System Profile, attempting to upload hardware and software configurations. It wasn't successful at either the upload or the evaluation, but it did access the profiling software without a hesitation. |
Thread Tools | Search this Thread |
Display Modes | |
|
|