definitely a my response is one identified from the clueless... but i think the author means is that non-executables (like text files) could be used to embed a malicious snippet for the interpreter to execute. most scripts are only text files until they are read by the interpreter. :-)
but since it has been said that this is pretty much on the slim side, i am grateful for any explanations/points/views that you could impart to my silly brain. ciao! Sacha Chua wrote: > > Rick Moen <[EMAIL PROTECTED]> writes: > > >> Thus far, no one has attempted to embed such an exploit into a LaTeX, > >> PDF, or image file, but I'll leave the challenge open to anyone who > > <notes that LaTeX files are actually plain text files (shhhhh)> > > <notes that you can less a LaTeX file and actually understand it> > > <notes that you don't even usually need to convert a LaTeX file into > dvi or pdf form in order to read it> > > All hail Knuth. =) -- "Programming, an artform that fights back." ============================= Anuerin G. Diaz Design Engineer Millennium Software, Incorporated 2305 B West Tower, Philippines Stocks Exchange Center, Exchange Road, Ortigas Center, Pasig City Tel# 637-4634 loc. 75 Fax# 637-4679 Registered Linux User #246176 ============================= _ Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph To leave: send "unsubscribe" in the body to [EMAIL PROTECTED] Fully Searchable Archives With Friendly Web Interface at http://marc.free.net.ph To subscribe to the Linux Newbies' List: send "subscribe" in the body to [EMAIL PROTECTED]
