Subject: Re: download-vulnerability-list bug?
To: Alistair Crooks <email@example.com>
From: Greg A. Woods <firstname.lastname@example.org>
Date: 10/21/2002 13:22:11
[ On Monday, October 21, 2002 at 18:42:31 (+0200), Alistair Crooks wrote: ]
> Subject: Re: download-vulnerability-list bug?
> On Mon, Oct 21, 2002 at 12:28:53PM -0400, Greg A. Woods wrote:
> > That's a _HUGE_ amount of hoop-jumping over-complicated accounting just
> > to satisfy a rather poorly designed integrity check. It's doubly worse
> > considering the purpose of the content of that file.
> Thanks for your opinions, Greg. I shall, as ever, give them the amount
> of respect which they are due.
I already posted an actual answer to how a proper integrity check could
be easily implemented. Did you not read it? Do you need help
implementing it? (the first question is an attempt at sarcasm, the
second is serious)
Greg A. Woods
+1 416 218-0098; <email@example.com>; <firstname.lastname@example.org>
Planix, Inc. <email@example.com>; VE3TCP; Secrets of the Weird <firstname.lastname@example.org>