On 30 Mar 1999 [EMAIL PROTECTED] wrote:
[SNIP]
> In that sense, it isn't too different from a Linux user like myself
> reading email via Emacs, seeing a uuencoded, gzip'ed executable,
> unpacking it, and then running it, without regard for whether that's
> safe. (Except, since it isn't just a few clicks away in that
> environment, I'd have to read the docs to know how to set that up,
> and thus know enough to not take such chances.)
[SNIP]
That's why after you ungzip a binary in Linux that you got
from email, you do a: strings file | more on it. Usually if to
contains questionable strings (like '/etc/shadow'), then you know to
look out :)
-Dustin