When a MySpace user visited Samy's page, that user would execute the attack code.
From"Hacking Exposed Web 2.0" by Rich Cannings, Himanshu Dwivedi, ZaneLackey
- Grab the nearest book.
- Open it to page 56.
- Find the fifth sentence.
- Post the text of the sentence in your journal along with these instructions.
- Don't dig for your favorite book, the cool book, or the intellectual one: pick the CLOSEST.
ps: testing out emacs-gblogger