From bob@RATTLESNAKE.COM Thu Jul 25 04:50:28 2002
Return-Path: <bob@rattlesnake.com>
X-Sender: bob@rattlesnake.com
X-Apparently-To: lojban@yahoogroups.com
Received: (EGP: mail-8_0_7_4); 25 Jul 2002 11:50:27 -0000
Received: (qmail 96519 invoked from network); 25 Jul 2002 11:50:27 -0000
Received: from unknown (66.218.66.218)
  by m10.grp.scd.yahoo.com with QMQP; 25 Jul 2002 11:50:27 -0000
Received: from unknown (HELO localhost) (140.186.114.245)
  by mta3.grp.scd.yahoo.com with SMTP; 25 Jul 2002 11:50:26 -0000
Received: by rattlesnake.com
  via sendmail from stdin
  id <m17Xh8N-000IeMC@localhost> (Debian Smail3.2.0.114)
  Thu, 25 Jul 2002 11:50:19 +0000 (UTC) 
Message-Id: <m17Xh8N-000IeMC@localhost>
Date: Thu, 25 Jul 2002 11:50:19 +0000 (UTC)
To: lojbab@lojban.org
Cc: lojban@yahoogroups.com
In-reply-to: <5.1.0.14.0.20020724195628.032f4c80@pop.east.cox.net> (message
  from Bob LeChevalier on Wed, 24 Jul 2002 21:28:12 -0400)
Subject: Re: [lojban] to-do list (was Re: New Members, Board of
  Directors, other LogFest results)
References: <5.1.0.14.0.20020723195058.030913c0@pop.east.cox.net>
  <5.1.0.14.0.20020723025544.032cba90@pop.east.cox.net>
  <4.3.2.7.2.20010730221611.00b10c00@pop.cais.com>
  <acri3c+8mml@eGroups.com>
  <5.1.0.14.0.20020723025544.032cba90@pop.east.cox.net>
  <20020723103956.E28971@miranda.org>
  <5.1.0.14.0.20020723195058.030913c0@pop.east.cox.net>
  <5.1.0.14.0.20020724122649.032e7ec0@pop.east.cox.net> <5.1.0.14.0.20020724195628.032f4c80@pop.east.cox.net>
From: "Robert J. Chassell" <bob@RATTLESNAKE.COM>
Reply-To: bob@rattlesnake.com
X-Yahoo-Group-Post: member; u=810561


You have to understand that many people don't want to install ANY
software downloaded from the net. there is a certain paranoia
that has set in. 

You can be safer downloading from the Net than installing from a CD
since the program goes through fewer steps from creators to you, and
the steps are more visible. When you download from the net, you can,
for example, check the MD5 sums for the programs you install with more
confidence.

Think about a recent warning example: the CD from Microsoft with a
virus in it that hurts people using Microsoft software. I doubt that
the software creators themselves wanted to damage their own code, but
they did not protect the safety of their work because they did not
monitor the stages through which it traveled.

If you are concerned, avoid CDs and -- most importantly -- avoid any
software whose license forbids you or people you trust from looking at
the source. Remember, three different groups may look at sources:
the creators, the bad guys, and the good guys.

Good security can exist, but you are in trouble when you (or people
you trust) cannot determine whether a company has installed that
security well, except by being robbed or otherwise hurt yourself,

-- 
Robert J. Chassell bob@rattlesnake.com
Rattlesnake Enterprises http://www.rattlesnake.com

