>I'd be very hesitant about giving away something that might enable 
>"destructive influences" to further their aims.

It's a damned if you do/don't.
I thank IBM for closing a hole.
But, without knowing anything about what the exposure is, how do we know how to 
configure the security settings?

-
Too busy driving to stop for gas!

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to