On Sat, 09 Jul 2011 08:19:50 -0400, FromTheRafters wrote:
> BD wrote:
>> That answer is inadequate and does not answer the original question.
>
> It seems adequate to me, and additionally there are people out there who
> tear apart security related programs just to see what weaknesses there
> are in them - "Little Willy" and Tegam comes to mind.
>
> It is not at all likely that malicious activity will go unnoticed.
>
> A trap door is more likely, but even that is not that likely.
No amount of logical explanation is likely to dislodge his 'hinky'. BD
and logic are anathema to one another.
--
"Those who do not make human beings the center of their concern soon
lose the capacity to make any ethical choices, for they willingly
sacrifice others in the name of the politically expedient and
practical." - Dwight Macdonald, “The Root Is Man.”


Reply With Quote