![]() |
Active X
I have a page stored on my hard drive that is basically just a text box (I use it as a quick spell checker), the entire page is simply:
Code:
|
Maybe add a body closing tag to the page.
|
Sorry, just realise I forgot to post to thank you for the suggestion. Thanks (but unfortunately cleaning up the code did not work).
|
The one possibility that comes to mind is a toolbar that is modifying the tag to include some code for popups that is being blocked by the browser.
Recently I've seen some exploits that depend on jquery being present on a page that do similar modifications where view source doesn't show anything, but, the webmaster tools in firefox/chrome for view generated source reveal the bad code. Might want to run a check to see if the page itself has some code embedded really far down or right and that you're not just assuming since everything you see in the viewport is all that is there, or, to see if you have a toolbar or malware running that might be modifying the page on the fly. There are 'innocent' toolbars that do use activeX to do tracking and send back information to a central location for trending that might also do it. Or, perhaps spellcheck is now an activeX control and is triggered when the browser see a textarea. Does it happen on any page with a textarea? or just that one? |
Thanks. The Toolbar hit a nerve because a while back I downloaded some software that came with a toolbar and discovered that the company was not entirely honest. I deleted the software but could not get rid of the toolbar, so just "switched it off", but that could simply mean "switched off any visible sign of it".
So now my question is: "Does anyone know how to uninstall the AVG toolbar?" !!! |
Quote:
|
All times are GMT -4. The time now is 04:59 AM. |
Powered by vBulletin® Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
© Greenguy Marketing Inc