jac@paul.rutgers.edu (Jonathan A. Chandross) (09/07/90)
Submitted-by: jac Posting-number: Volume 1, Administrivia: 9 From: Brinton Cooper <abc@brl.mil> The problem with using 'shar' or a feature like it is that someone can easily embed a Trojan Horse into the shar archive. When you run shar on a Unix(tm) system, you are giving over the control of your shell to the shell commands embedded in the archive. Obvious things, such as "rm *.*" or more subtile but equally destructive things can be wrapped into the shar archive. The moderator or other checker just may not be able to catch all of them manually. We probably should stick to basic utilities with specific functions. [ Good point. apack/aunpack do not allow you to write Trojan Horses, viruses, etc. Simplicity at its best. ] -------------------------------------------------------------------------------- To get something posted to comp.sources.apple2, send it to: Internet: jac@paul.rutgers.edu UUCP: rutgers!paul.rutgers.edu!jac Jonathan A. Chandross Internet: jac@paul.rutgers.edu UUCP: rutgers!paul.rutgers.edu!jac