I know I tend to sit in the back row and ignore what's going on down front most of the time but I have a few questions/comments about "
Microsoft's bounty":
- Given that the author already knows how to break into computers, what's to stop him/her from chosing another programmer and planting the "evidence" on that person's computer before calling the cops?
- Where is all this bounty money coming from? (If you can't guess the obvious answer, e-mail "joat@757.org" with a subject line of "obvious answer" (without the quotes)(an infobot will answer).
No comments:
Post a Comment