____  _ ____ ____ ______ ____  
|___ \| |___ \___ \____  |___ \ 
  __) | | __) |__) |  / /  __) |
 |__ <| ||__ <|__ <  / /  |__ < 
 ___) | |___) |__) |/ /   ___) |
|____/|_|____/____//_/   |____/ 
      

i pwn all thats all u need to know.

Friday, August 3, 2007

//flash XML cache hack

here is a simple work around to this issue, by adding the parameter '?+Math.random()', flash will now be fooled into thinking it is a new URL each tme using the randomizer function each time the file gets called.


//code
xml.load("xmlData.xml?"+Math.random());

//reference
Live Docs

Labels: , , , ,

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home