On Thu, 2003-04-03 at 11:43, fooler wrote:
> 
> as i understand here, the hackers will be the one to provide us what
> services are going to run...

I believe the speakers will be the one to provide the instructions.

> first clarification... are they going to provide us the source code and we
> will be the one responsible to compile and run it? or they will provide us a
> compiled program and we will just run it?

I think it's our discretion if we will install packages from source or
not.  I believe that the packages that will be used for the Windows 2000
box are all binaries.

> second clarification.. they must define clearly about the definition of a
> hacked system..

Exactly and that's very important.


---
MARVIN T. PASCUAL
E-mail: [EMAIL PROTECTED]
Tel. No. +63 2 4145602
Mobile No. +63 919 3141254
Yahoo! Messenger ID: bintut
GnuPG Key ID: 7269E38D
GNU/Linux User No. 247127

           ---o0o---o0o---o0o---o0o---o0o---o0o---o0o---o0o---
             Diskless Thin Client Networking using GNU/Linux
           ---o0o---o0o---o0o---o0o---o0o---o0o---o0o---o0o---

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to