On Thu, 2003-04-03 at 11:43, fooler wrote: > > as i understand here, the hackers will be the one to provide us what > services are going to run...
I believe the speakers will be the one to provide the instructions.
> first clarification... are they going to provide us the source code and we
> will be the one responsible to compile and run it? or they will provide us a
> compiled program and we will just run it?
I think it's our discretion if we will install packages from source or
not. I believe that the packages that will be used for the Windows 2000
box are all binaries.
> second clarification.. they must define clearly about the definition of a
> hacked system..
Exactly and that's very important.
---
MARVIN T. PASCUAL
E-mail: [EMAIL PROTECTED]
Tel. No. +63 2 4145602
Mobile No. +63 919 3141254
Yahoo! Messenger ID: bintut
GnuPG Key ID: 7269E38D
GNU/Linux User No. 247127
---o0o---o0o---o0o---o0o---o0o---o0o---o0o---o0o---
Diskless Thin Client Networking using GNU/Linux
---o0o---o0o---o0o---o0o---o0o---o0o---o0o---o0o---
signature.asc
Description: This is a digitally signed message part
