here is something posted to p5p today.
looks like a good place to start Stas's challenge.
Benjamin Elijah Griffin wrote:
> In alt.hackers a while ago I saw this .sig:
>
> #!/usr/bin/perl
> $j=\$j;{$_=unpack(P25,pack(L,$j));/Just Another Perl Wannabe/?print:$j++&&redo}
>
> It occured to me after the xlockmore stuff in bugtraq recently that
> having a way to get a pointer in perl and roam around memory looking
> for stuff might pose a security problem for embeded perl, eg:
> a mod_perl script that roams around apache reading passwords stored
> still in memory.
>
> Is this something to worry about?
>
> Benjamin
> ------
> hoping this is the apporpriate place to ask
--
___cliff [EMAIL PROTECTED]