Polyna-Maude Racicot-Summerside wrote: > Now here's what will amaze you... > You can do the same with a computer. > Take risk... > Make your computer unusable... > Type "alias cd=rm -rf" > Open all the ports and get hacked. > Open all the ports and not get hacked. > Take risk and loose not much because you don't care... > Choose unsafe configuration.
I endorse this as best practice for my competitors. For people that I consider part of my community, I feel a higher standard of care is in order. -dsr-