->Malicious code can be written and disguised in many
->ways - within application macros, Java(tm) applets,
->ActiveX(tm) controls, Navigator plug-ins, Macintosh(R)
->applications and more.
The choice of examples is priceless... Macros, Java, ActiveX,
Netscape, ** Macintosh apps **...
Sigh.
--
John Klassa (W) klassa@ivc.com (H) klassa@ipass.net
<>< http://www.ivc.com/~klassa http://www.ipass.net/~klassa
Although it seems apparent that a continued insufficiency in close
proximity to the prototype model of the material duration is in the
proximity of the meaningfulness, the data structure connected up to an
indicated consciousness is in an evolving organization.