Re: MS Response to Chaos Computer Club Quicken Hack

John Klassa (klassa@ivc1.ivc.com)
Thu, 20 Feb 1997 12:17:26 -0500


Love that subtle Mac jab... Brad Silverberg's letter says:

->Malicious code can be written and disguised in many
->ways - within application macros, Java(tm) applets,
->ActiveX(tm) controls, Navigator plug-ins, Macintosh(R)
->applications and more.

The choice of examples is priceless... Macros, Java, ActiveX,
Netscape, ** Macintosh apps **...

Sigh.

-- 
John Klassa  (W) klassa@ivc.com              (H) klassa@ipass.net
    <><          http://www.ivc.com/~klassa      http://www.ipass.net/~klassa

Although it seems apparent that a continued insufficiency in close proximity to the prototype model of the material duration is in the proximity of the meaningfulness, the data structure connected up to an indicated consciousness is in an evolving organization.