Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.
Source code from http://www.jamesmolloy.co.uk/tutorial_html/index.html with improved build system and some simplifications. Behaviour is very close to the tutorial so ...