[comp.sources.apple2] v01_ADM_9: The Continued Saga of Packaging

jac@paul.rutgers.edu (Jonathan A. Chandross) (09/07/90)

Submitted-by: jac
Posting-number: Volume 1, Administrivia: 9

From: Brinton Cooper <abc@brl.mil>

The problem with using 'shar' or a feature like it is that someone can
easily embed a Trojan Horse into the shar archive.  When you run shar on
a Unix(tm) system, you are giving over the control of your shell to the
shell commands embedded in the archive.  Obvious things, such as 
"rm *.*" or more subtile but equally destructive things can be wrapped
into the shar archive.  The moderator or other checker just may not be
able to catch all of them manually.

We probably should stick to basic utilities with specific functions.

[ Good point.  apack/aunpack do not allow you to write Trojan Horses,
  viruses, etc.  Simplicity at its best. ]

--------------------------------------------------------------------------------

To get something posted to comp.sources.apple2, send it to:
	Internet: jac@paul.rutgers.edu
	UUCP: rutgers!paul.rutgers.edu!jac


Jonathan A. Chandross
Internet: jac@paul.rutgers.edu
UUCP: rutgers!paul.rutgers.edu!jac