ajax: script: Threat sameDomain file:// requests as crossDomain
Due to file:// XHR security measures in Chromium[1], dynamic loading
of scripts need to use the script tag injection hack.
FYI: Chromium are considering possible ways to loosen these restrictions[2].
Tested in Chromium 6.0.472.63, Firefox 3.6.7 and Konqueror 4.4.5
[1] http://code.google.com/p/chromium/issues/detail?id=4197
[2] http://code.google.com/p/chromium/issues/detail?id=47416
Signed-off-by: Asbjørn Sloth Tønnesen <ast@mugami.com>