21.03.2012 03:50, Ben Hutchings wrote:
So why do we need this as well as fakeroot?
For example, this program can be easily used to run an untrusted or buggy blob relatively safely. How can I do this using only fakeroot?

Ivan.



--
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4f69dcc1.4030...@gmail.com

Reply via email to