On Sun, Jan 14, 2001 at 11:26:28PM -0500, Mark Rogaski wrote: > It's also sheer idiocy to pipe arbitrary code from an untrusted, unverified > source directly to the shell. How is it less secure than downloading a tar file and typing ./configure? Admittedly you *could* check several meg of source for trojans, but I don't believe you *do*. Michael
- Re: Mailman in Perl (Re: the list is dead, l... David H. Adler
- Partitioning schemes (was RE: Mailman....) Neil Ford
- Re: Partitioning schemes (was RE: Mailman...... David H. Adler
- Re: Mailman in Perl (Re: the list is dead, l... Mark Rogaski
- Re: Mailman in Perl (Re: the list is dead, l... David H. Adler
- Re: Mailman in Perl (Re: the list is dead, l... Greg McCarroll
- Re: Mailman in Perl (Re: the list is dead, l... David Cantrell
- Re: Mailman in Perl (Re: the list is dead, l... David Cantrell
- Re: Mailman in Perl (Re: the list is dead, l... Mark Rogaski
- Re: Mailman in Perl (Re: the list is dead, l... David Cantrell
- Re: Mailman in Perl (Re: the list is dead, l... Michael Stevens
- Re: Mailman in Perl (Re: the list is dead, l... Greg McCarroll
- Re: Mailman in Perl (Re: the list is dead, l... Aaron Trevena
- Re: Mailman in Perl (Re: the list is dead, l... Aaron Trevena
- Re: Mailman in Perl (Re: the list is dead, l... David H. Adler
- Re: the list is dead, long live the list Paul Makepeace
- Re: the list is dead, long live the list Greg McCarroll
- Re: the list is dead, long live the list David Cantrell
- Re: the list is dead, long live the list David Hodgkinson
- Re: the list is dead, long live the list David Cantrell
