Posted by Jonathan N. Little on 09/27/06 02:04
Marvel wrote:
>> Jonathan wrote
>>> Here are firewall programs that insert javascript to trap onload events
>>> to disable popups, I bet that is what you are witnessing. How about a
>>> URL?
> 2 urls
> drfixup.com/test.html (this one I created just now with only one word and
> one image) and yes it did the same thing
Yep, it is *your* firewall doing it . It is not being inserted at the
server level. Here is the source from my browser:
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html; charset=ISO-8859-1" http-equiv="content-type">
<title>testt</title>
</head>
<body>
<div style="text-align: center;"><a href="http://www.drfixup.com/">Osaka
</a><br>
<br>
<img style="width: 570px; height: 480px;" alt="j girls" src="shi2.JPG"><br>
</div>
</body>
</html>
You have to disable your firewall's anti-popup feature if you wish to
remove the code or just ignore it.
--
Take care,
Jonathan
-------------------
LITTLE WORKS STUDIO
http://www.LittleWorksStudio.com
Navigation:
[Reply to this message]
|