Aaron Kulkis:
Other than *very* *old*, uncorrected code with buffer-overflow vulnerabilities, due to calls to strcat(3) instead of strncat(3), and similar pitfalls which are now very well understood since the first use in th 1987 Morris Worm, you have to provide some hard documentation (i.e. code sections) to make your point here.
Aaron, buffer-overflows were a problem because applications can do pretty much anything. So they've been dealt with and are more or less gone for good. The pipeline from authors through distributions and community audits to the user works. I'm not too much concerned with the security of that well-established and trusted pipeline (although I am a bit). But there are many other pipelines that give you access to software. It's a Wide Web and you don't know what's coming at you. Wrt carelessness: Every now and then you've shared a little of your experiences in Baghdad. You, of all people, would know that carelessness can be lethal. You wouldn't touch children toy booby-traps or anything from unknown origin for that matter just because you were with the strongest military force on earth. You were careful and that is probably one of the reasons why you returned. Why should you use your computer differently and just "click"? Wolfgang -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org