diff --git a/e107_plugins/log/e_meta.php b/e107_plugins/log/e_meta.php
index 16cddd6e8..bd1534656 100644
--- a/e107_plugins/log/e_meta.php
+++ b/e107_plugins/log/e_meta.php
@@ -9,8 +9,8 @@
* Administration Area - User classes
*
* $Source: /cvs_backup/e107_0.8/e107_plugins/log/e_meta.php,v $
- * $Revision: 1.4 $
- * $Date: 2009-11-08 16:15:31 $
+ * $Revision: 1.5 $
+ * $Date: 2009-11-08 19:46:44 $
* $Author: e107steved $
*
*/
@@ -32,12 +32,10 @@ if (isset($pref['statActivate']) && $pref['statActivate'])
if (is_numeric(e_QUERY)) $err_flag .= '/'.substr(e_QUERY,0,10); // This should pick up the error code - and limit numeric length to upset the malicious
$err_flag .= "&err_referer=".$_SERVER['HTTP_REFERER'];
}
- echo "\n";
+document.write( '' );
+";
+ $e107 = e107::getInstance();
+ $e107->getJs()->headerInline($logJS, 5);
+
}