Last week, I had an attempted intrusion on my PC, which was prevented by Norton Security Suite. The alert name was listed as “Fake Flash Update Download 2”. I received what appeared to be a Flash Update popup, and even though I clicked the little “X” in the upper-right part of the box, it attempted to do its dirty work. It looked like someone had copied an image of the popup into another web page. I am running SeaMonkey as a browser. To increase security for this type of attack, I installed the Firefox addons AdBlock Plus and NoScripts. NoScripts lists all the scripts attempting to run on a web page. I have been researching what the “mission” is for the owner of each script. On a local TV station website, one of the scripts that I denied permission to run was listed as “secondface.com”. I researched this domain, and it is listed as for sale. I could not find what the script’s funcction was, but to me, that means there is a real possibility of buying that domain, and injecting malware into PCs. I have a feeling that so many third-party domains have their tentacles into a typical commercial web page, that the owner of the web page has no idea who all these people are, or what their purpose is. Just my 2-cents worth. If this is not the place to discuss this topic, moderator, feel free to remove my post.