begin: ME <[EMAIL PROTECTED]> quote
>
> http://www.big.net.au/~silvio/
very impressive!
> page. Most require root access, but some may allow a user to infect binary
> files if they have write access to them - no need to be root if the user
> has group membership to write to a binary file with group write
> permissions in their group!
that's a big if...
> I will admit that the present risk for infection in Linux systems is low
> based on *history*. Howver, Linux as an OS is not immune to viruses. "Wild
> type" viruses for Linux are rather *uncommon* (Sorry! How about very rare
> and close to endangered?. ;-) Quite rare at present
rare implies that at least one person has been infected who didn't desire
to be infected. is that true?
> > programmer. Use gets() absolutely *never* at all (use fgets()
> > instead).
>
> This good! :-)
or use the "n" variants. :)
pete
--
"The following addresses had permanent fatal errors..." [EMAIL PROTECTED]
-- Mailer Daemon www.dirac.org/p