Someone changed the images!!! hehehe.. but the links are not changed... curious... someone must know a bit about parallax's web server to gain access using a known vulnerability?, or perhaps an image web folder has open permissions...
CRC checksum hashes should help calm jitters about files being potentially "hacked"...
Thank's that worked but I did not change anything myself since it was working yesterday.
On the plus side it did educate me on the settings you mentioned
Comments
http://www.parallax.com/Portals/0/Resources/support/Button-USB.jpg
http://www.parallax.com/Portals/0/Resources/support/Button-CD.jpg
Uh oh.
http://www.parallax.com/Support/SupportHome/tabid/474/Default.aspx
Someone changed the images!!! hehehe.. but the links are not changed... curious... someone must know a bit about parallax's web server to gain access using a known vulnerability?, or perhaps an image web folder has open permissions...
CRC checksum hashes should help calm jitters about files being potentially "hacked"...
You can try getting the drivers from FTDI directly.
If thats infact the device your trying to get.
http://www.ftdichip.com/Drivers/VCP.htm
Who wants to bet that homeland security would like to know about this?
Looks like it's being addressed...
OBC
I wonder if it is related to Parallax site being hacked.
I only show a handfull of posts
Jim
On the plus side it did educate me on the settings you mentioned