From bob@RATTLESNAKE.COM Thu Jul 25 04:50:28 2002 Return-Path: X-Sender: bob@rattlesnake.com X-Apparently-To: lojban@yahoogroups.com Received: (EGP: mail-8_0_7_4); 25 Jul 2002 11:50:27 -0000 Received: (qmail 96519 invoked from network); 25 Jul 2002 11:50:27 -0000 Received: from unknown (66.218.66.218) by m10.grp.scd.yahoo.com with QMQP; 25 Jul 2002 11:50:27 -0000 Received: from unknown (HELO localhost) (140.186.114.245) by mta3.grp.scd.yahoo.com with SMTP; 25 Jul 2002 11:50:26 -0000 Received: by rattlesnake.com via sendmail from stdin id (Debian Smail3.2.0.114) Thu, 25 Jul 2002 11:50:19 +0000 (UTC) Message-Id: Date: Thu, 25 Jul 2002 11:50:19 +0000 (UTC) To: lojbab@lojban.org Cc: lojban@yahoogroups.com In-reply-to: <5.1.0.14.0.20020724195628.032f4c80@pop.east.cox.net> (message from Bob LeChevalier on Wed, 24 Jul 2002 21:28:12 -0400) Subject: Re: [lojban] to-do list (was Re: New Members, Board of Directors, other LogFest results) References: <5.1.0.14.0.20020723195058.030913c0@pop.east.cox.net> <5.1.0.14.0.20020723025544.032cba90@pop.east.cox.net> <4.3.2.7.2.20010730221611.00b10c00@pop.cais.com> <5.1.0.14.0.20020723025544.032cba90@pop.east.cox.net> <20020723103956.E28971@miranda.org> <5.1.0.14.0.20020723195058.030913c0@pop.east.cox.net> <5.1.0.14.0.20020724122649.032e7ec0@pop.east.cox.net> <5.1.0.14.0.20020724195628.032f4c80@pop.east.cox.net> From: "Robert J. Chassell" Reply-To: bob@rattlesnake.com X-Yahoo-Group-Post: member; u=810561 X-Yahoo-Message-Num: 14729 You have to understand that many people don't want to install ANY software downloaded from the net. there is a certain paranoia that has set in. You can be safer downloading from the Net than installing from a CD since the program goes through fewer steps from creators to you, and the steps are more visible. When you download from the net, you can, for example, check the MD5 sums for the programs you install with more confidence. Think about a recent warning example: the CD from Microsoft with a virus in it that hurts people using Microsoft software. I doubt that the software creators themselves wanted to damage their own code, but they did not protect the safety of their work because they did not monitor the stages through which it traveled. If you are concerned, avoid CDs and -- most importantly -- avoid any software whose license forbids you or people you trust from looking at the source. Remember, three different groups may look at sources: the creators, the bad guys, and the good guys. Good security can exist, but you are in trouble when you (or people you trust) cannot determine whether a company has installed that security well, except by being robbed or otherwise hurt yourself, -- Robert J. Chassell bob@rattlesnake.com Rattlesnake Enterprises http://www.rattlesnake.com