On Tue, 24 Jan 1995, James A. Donald wrote: > For example all unix machines are vulnerable to the trojan horse attack. Ah, which one would this be? -- Dave Horsfall (VK2KFU) | [email protected] | VK2KFU @ VK2AAB.NSW.AUS.OC | PGP 2.6 Opinions expressed are mine. | E7 FE 97 88 E5 02 3C AE 9C 8C 54 5B 9A D4 A0 CD