Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment: Re:Worthless Trademark (Score 2, Interesting) 273

by MikaelC (#33640120) Attached to: Woman Trademarks Name and Threatens Sites Using It

Comment: Re:Worthless Trademark (Score 2, Insightful) 273

by MikaelC (#33637432) Attached to: Woman Trademarks Name and Threatens Sites Using It
I did a quick search for this Nutrilab Corp.

Take a look at the following sites, that all link to each other, and revolves about dr. Ann:

http://www.anndeweesallen.com/ [ip:64.106.155.30]
http://www.nanoscienceinstitute.com/ [ip:64.106.155.30]
http://www.glycemic.com/ [ip:64.106.155.30]
http://www.nutrilabusa.com/ [ip:64.106.155.30]
http://www.genefoundation.com/ [ip:64.106.155.30]
http://www.ediblecomputerchips.com/ [ip:64.106.155.30]
http://www.trutinadulcem.com/ [ip:64.106.155.30]


Notice anything peculiar about the IP-number?

Comment: !Exploit (Score 1) 234

by MikaelC (#31692460) Attached to: New Method Could Hide Malware In PDFs, No Further Exploits Needed
Okay. So the PDF standard has the potential for launching external (or even embedded) files. In Adobe Reader this will create a warning dialog with the following text: "The file and its viewer application are set to be launched by this PDF file. The file may contain programs, macros, or viruses that could potentially harm your computer. Only open the file if you are sure it is safe. If this file was placed by a trusted person or program, you can click Open to view the file." That seems perfectly clear to me. There is really no reason to change this behavior. This is not an exploit.

"Your stupidity, Allen, is simply not up to par." -- Dave Mack (mack@inco.UUCP) "Yours is." -- Allen Gwinn (allen@sulaco.sigma.com), in alt.flame

Working...