21.03.2012 03:50, Ben Hutchings wrote:
For example, this program can be easily used to run an untrusted or buggy blob relatively safely. How can I do this using only fakeroot?So why do we need this as well as fakeroot?
Ivan. -- To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4f69dcc1.4030...@gmail.com