|
James, what you are forgetting is that there may be bad guys out there that consider this activity superior to 'getting a product of the door'. ----- Original Message ----- From: <jamesl@hb.quik.com> To: <MI400@midrange.com> Cc: <jamesl@hb.quik.com> Sent: Thursday, June 07, 2001 11:14 AM Subject: Re: No single case of hacking... > On Thu, 7 Jun 2001 10:15:33 -0500 "Joe Pluta" wrote: > . . . > > . . . any > programmer worth his salt can access any object on > > the machine at any time. > > . . . > > Dear Joe (et al.): > > Any programmer worth his salt who has had the > time, opportunity, and > inclination to learn techniques for doing so. As > opposed to having other > interests, and/or as opposed to attempting to get > viable commercial products > out the door. > > As always, please forgive the > gratuitous carriage returns, courtesy of my ISP's > web-mail > interface. > -- > JHHL > > > +--- | This is the MI Programmers Mailing List! | To submit a new message, send your mail to MI400@midrange.com. | To subscribe to this list send email to MI400-SUB@midrange.com. | To unsubscribe from this list send email to MI400-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: dr2@cssas400.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.