rtm and uucp
Jim Meritt
jwm at stdc.jhuapl.edu
Thu Nov 17 03:42:55 AEST 1988
In article <90 at lazlo.UUCP> ccs at lazlo.UUCP (Clifford C. Skolnick) writes:
}In article <8597 at rpp386.Dallas.TX.US> jfh at rpp386.Dallas.TX.US (John F. Haugh II) writes:
}>
}>It would be so nice if someone would undertake a security audit to
}>insure that work other college students did, which *is* currently
}>in production, doesn't contain any surprizes.
}
}What evidence do you have that college students are evil programmers
}whos code should be verified? It does not take a college student to place
}a section of unathorized code into a program. I'm sure many programs out
}in the real word have similar features added by a programmer and abused
}by another (as this case was).
OK set folk, where am I wrong? (go to it, weemba!)
I do not see:
1. The original post did not say ALL college students are "evil programmers"
(it implied to me that most were not, though)
2. The original post said ONE college student was (rtm)
3. The original post did not say ONLY college students are "evil programmers".
So why the flail, unless the old "protesteth too much" syndrome?
Disclaimer: "It's mine! All mine!!!"
- D. Duck
More information about the Comp.unix.wizards
mailing list