Hi Dave,
I'm sure you remember the easter egg that Ken Thompson revealed a
few years ago. It's well worth reading:
http://www.wins.uva.nl/~mes/jargon/b/backdoor.html
http://www.acm.org/classics/sep95/
With this in mind, many people still maintain machines that they have
read _every_ line of source for. To them, running an outside binary
is anathema.
Mitch.
-- | mailto:mjd#NOSPAM@nsmd.aus.hp.com | Not an official view of: | | mailto:mjd#NOSPAM@alphalink.com.au | Telecom Management Divn | | Remove the #NOSPAM to send me mail | Hewlett Packard Australia |