Is this news? Is this surprising to anyone? ANYTHING a browser can render is public information. Meaning anything a browser can display, you can easily get the source to. HTML, scripts, images, etc... Just telnet to the IP/port and you can see exactly what your browser sees. The point is, there is very litlle anyone can do about protecting Interlectaral property on the HTTP protocol. The HTTP protocal was developed to share info, not hide it. Chris On Wed, 27 Dec 2000, CrowKiller wrote: > Date: Wed, 27 Dec 2000 21:20:39 -0500 > To: PICLIST@mitvma.mit.edu > From: CrowKiller > Reply-To: pic microcontroller discussion list > > Subject: Re: [OT]: Interesting Javascript for page security? > > Hi, > just wanna tell you a short thing: > I have Netscape 4.6 (win32) and even if you block all "option", > like right-clicking on a page for the source or anything, there's > always the keyboard shortcuts working. > > Example: > - You are viewing a page protected in javascript, and want to see > the HTML? press CTRL+U. The source window appear right in > front of you! > > -If you want to search some text, set the focus on that > window and press CTRL+F. Want to copy in the clipboard parts > of the code? then select it and press CTRL-C. Wanna paste it? > Press CTRL-V in a textfield somewhere. > > -Tired of entering "****" no-paste passwords manually? > select the password, CTRL-C, focus on the "*" field and > CTRL-V. > > However, here's an adress if you want to implement event trapping: > http://javascript.internet.com/page-details/protect-images.html > > CrowKiller > > -- > http://www.piclist.com hint: To leave the PICList > mailto:piclist-unsubscribe-request@mitvma.mit.edu > > -- Earnest HemmingWay wrote: "The world is a fine place, and worth fighting for" I agree with the second part. -- http://www.piclist.com hint: To leave the PICList mailto:piclist-unsubscribe-request@mitvma.mit.edu