---
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&o
y (no specific
to a linux platform) Do you think that devices could create an overflow
in order to take control/install a software in the computer ?
(what hapen when the devices are not respecting the protocol ? )
thanks very much for your comments help or link
Fabien Bourdaire
--
Lilliput &l