Posted by: pathan March 30, 2006
Login in to Rate this Post:
0
?
![](/wysiwyg/editor/images/smiley/msn/thumbs_up.gif)
![10 more flags than likes deactivates post.](/wysiwyg/editor/images/smiley/msn/thumbs_down.gif)
okay, target close--> if your victim is someone you know or lives near you. you can find out what computer he/she uses. you can even get him/her to use your computer. now, what are the alternatives when you have done that, work out for yourself. do some work ( and thinking) dude.
javascript: javascript can be used to do many things. basically, if you can embed a javascript code on hotmail messages, then you can do it easily. but, hotmail doesn't allow it. i learned it the hard way. i wrote a lot of code just to find that it didn't work. and anyway as i said already, hackers are always reporting new flaws ( there were soem flaws that had actually been discovered just days before i tried exploiting them).
by the way, recently in my computer science class someone discovered that if you send javascript from yahoo to gmail, it's allowed. i don't know about that.