->Malicious code can be written and disguised in many
->ways - within application macros, Java(tm) applets,
->ActiveX(tm) controls, Navigator plug-ins, Macintosh(R)
->applications and more.
The choice of examples is priceless... Macros, Java, ActiveX,
Netscape, ** Macintosh apps **...
-- John Klassa (W) firstname.lastname@example.org (H) email@example.com <>< http://www.ivc.com/~klassa http://www.ipass.net/~klassa
Although it seems apparent that a continued insufficiency in close proximity to the prototype model of the material duration is in the proximity of the meaningfulness, the data structure connected up to an indicated consciousness is in an evolving organization.