On Sun, Jan 14, 2001 at 11:26:28PM -0500, Mark Rogaski wrote:
> It's also sheer idiocy to pipe arbitrary code from an untrusted, unverified
> source directly to the shell.

How is it less secure than downloading a tar file and typing ./configure?

Admittedly you *could* check several meg of source for trojans, but I
don't believe you *do*.


Reply via email to