The distinction between applets and apps is a valid one, but I am not sure that it is dichotomous here.
The crucial piece of information for a would-be villain is that a particular security vulnerability exists (because a particular breach has occurred); and on this occasion more than enough information about the locus of the vulnerability within Java is already available. I shall be surprised if some toxic Java apps do not make their appearance very soon now. John Gilmore, Ashland, MA 01721 - USA ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
