So we both had a learning experience.
I checked my /home and /tmp folders and looked to see if any new files were left after the attack, I even checked the hidden files but found nothing. These attacks try to install exe files which can't be run on Linux systems, I've never seen a pdf based exploit, but I'm sure they are out there, but then again, they can't install to a Linux system so I wouldn't worry about it.
NEVER run your system with root privileges, unless your doing administration work. Log out of your session and drop to an init level that exits gdm, kdm etc (init 3 in Debian and Fedora), and never open up your DE (Gnome, KDE, etc) with root as the user. The only way malicious code can infect your computer is if you give it the privileges to do so.
BTW - the site has plenty of room, new threads are welcome. :-)