On Sun, Jun 19, 2011 at 10:38 AM, Gregory Ewing
<greg.ew...@canterbury.ac.nz> wrote:
> And that only if the attacker isn't a Python programmer.
> If he is, he's probably writing his attack program in
> Python anyway. :-)
>

I was thinking you'd have it call on various functions defined
elsewhere in the program, forcing him to pretty much have the whole
original code in there. :)

ChrisA
-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to