On 30 Mar 1999 [EMAIL PROTECTED] wrote:

[SNIP]
> In that sense, it isn't too different from a Linux user like myself
> reading email via Emacs, seeing a uuencoded, gzip'ed executable,
> unpacking it, and then running it, without regard for whether that's
> safe.  (Except, since it isn't just a few clicks away in that
> environment, I'd have to read the docs to know how to set that up,
> and thus know enough to not take such chances.)
[SNIP]

        That's why after you ungzip a binary in Linux that you got
from email, you do a: strings file | more  on it.  Usually if to
contains questionable strings (like '/etc/shadow'), then you know to
look out :)

                                        -Dustin

Reply via email to