Polyna-Maude Racicot-Summerside wrote: 
> Now here's what will amaze you...
> You can do the same with a computer.
> Take risk...
> Make your computer unusable...
> Type "alias cd=rm -rf"
> Open all the ports and get hacked.
> Open all the ports and not get hacked.
> Take risk and loose not much because you don't care...
> Choose unsafe configuration.


I endorse this as best practice for my competitors.

For people that I consider part of my community, I feel a higher
standard of care is in order.

-dsr-

Reply via email to