<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d3323185\x26blogName\x3dbarnskiblog\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://barnski.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://barnski.blogspot.com/\x26vt\x3d5885749210978744567', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

barnskiblog

Barney's blog. Just a load of old shite really.

Microsoft Security Vulnerabilities plague us again. If you do use MS software, I'd apply the patches, especially if you make online purchases. Note that this one is a clanger in IE and office, so even you mac users are at risk.
The article says "There's more to come."
No shit.........

« Home | Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »