On 25 September 2014 22:40, Daniel J Walsh <dwalsh(a)redhat.com> wrote:
Good article Dan ... it says clearly what I've been trying to drum into
people's heads about the role it takes and how it confines the activity but
an exploit that stays within the confines of that activity ... well it has
to be allowed or else the standard activity would fail ;)