Privacy has really gone downhill at this site in the last 3 to 4 yrs.
Using the no script plug-in for Firefox and the Source & console view you can see the horrible coding and resulting sanitized entry's for the rotating ad banners and imbedded code:
[NoScript XSS] Sanitized suspicious request. Original URL [http://www.ad.tomshardware.com/cgi-bin/bd2.m?count=15997&time=SRO6vthcg4EAALclGj0&location=banner2/tomshardware_reviews_solutions_software_2008_11_06_roundup_the_best_overclocking_software/reviews/overclocking-software,2059-6.html&dns=us&fillin=0&topic=-amd-ati-intel-nvidia-overclocking-&image=http://ad.doubleclick.net
Error: Event.observe is not a function
Source File: http://www.tomshardware.com/reviews/overclocking-software,2059-6.html
Error: [Exception... "'The async request failed because it was aborted by some user action' when calling method: [nsIChannelEventSink::onChannelRedirect]" nsresult: "0x804b0002 (NS_BINDING_ABORTED)" location: "<unknown>" data: no]
It goes on and on .. 30-50 entry's per page.
XSS stands for Cross site scripting, a web application vulnerability which allows the attacker to inject malicious code from a certain site into a different site, and can be used by an attacker to "impersonate" a different user or to steal valuable information.
The only thing keeping me from listing this site as adware/spyware is the fact that the browser and security setup i run kept anything from executing. .. but if you run Internet Explorer watch out ;)
About this site
Tom's Hardware is the Internet's premiere resource for hardware news and reviews