Paul Schmel wrote:
Let's see....this would seem to indicate that they depend on the holes to run the applications.Well, that is pretty accurate. Pick any part of the architechture, the window event system, the pervasive visual basic access to system controls, lack of privilege seperation for services and a user community keep in the dark as to what the machine actually does . . .
:-)
Egads, the US government is entertaining a law against spyware to cover up the fact that the majority of americans are running a system so horribly broken that uninvited guests can render it inoperable . ? !
When will the hidden costs of running such a poor operating system be recognized ?
more, l8r, v
-- america sig
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
