True, but it is common virus technique to execute machine code by utilizing buffer overflows in a scripting language, and as such bypassing the limitations that are imposed by the scripting language.
Jan Jaeger
From: John Summerfield <[EMAIL PROTECTED]> Reply-To: Linux on 390 Port <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: Probably the first published shell code example for Linux/390 Date: Sat, 2 Nov 2002 15:25:52 +0800 On Fri, 1 Nov 2002 22:50, you wrote: > When we are talking about storing (ie overlaying) programs (trojans) on the Maybe I'm being picky, but trojans are always present by invitation. A user us sucked into installing a program that (maybe) does what's claimed of it, but also does something you might not like. -- Cheers John Summerfield Microsoft's most solid OS: http://www.geocities.com/rcwoolley/ Join the "Linux Support by Small Businesses" list at http://mail.computerdatasafe.com.au/mailman/listinfo/lssb
_________________________________________________________________ Surf voor nieuws, filenieuws & entertainment naar MSN.nl http://www.msn.nl/default.asp