Forgot your password?
typodupeerror

Comment: Re:Worthless Trademark (Score 2, Interesting) 273

by MikaelC (#33640120) Attached to: Woman Trademarks Name and Threatens Sites Using It

Comment: Re:Worthless Trademark (Score 2, Insightful) 273

by MikaelC (#33637432) Attached to: Woman Trademarks Name and Threatens Sites Using It
I did a quick search for this Nutrilab Corp.

Take a look at the following sites, that all link to each other, and revolves about dr. Ann:

http://www.anndeweesallen.com/ [ip:64.106.155.30]
http://www.nanoscienceinstitute.com/ [ip:64.106.155.30]
http://www.glycemic.com/ [ip:64.106.155.30]
http://www.nutrilabusa.com/ [ip:64.106.155.30]
http://www.genefoundation.com/ [ip:64.106.155.30]
http://www.ediblecomputerchips.com/ [ip:64.106.155.30]
http://www.trutinadulcem.com/ [ip:64.106.155.30]


Notice anything peculiar about the IP-number?

Comment: !Exploit (Score 1) 234

by MikaelC (#31692460) Attached to: New Method Could Hide Malware In PDFs, No Further Exploits Needed
Okay. So the PDF standard has the potential for launching external (or even embedded) files. In Adobe Reader this will create a warning dialog with the following text: "The file and its viewer application are set to be launched by this PDF file. The file may contain programs, macros, or viruses that could potentially harm your computer. Only open the file if you are sure it is safe. If this file was placed by a trusted person or program, you can click Open to view the file." That seems perfectly clear to me. There is really no reason to change this behavior. This is not an exploit.

Some people have a great ambition: to build something that will last, at least until they've finished building it.

Working...