On Sun, Jun 19, 2011 at 10:38 AM, Gregory Ewing <greg.ew...@canterbury.ac.nz> wrote: > And that only if the attacker isn't a Python programmer. > If he is, he's probably writing his attack program in > Python anyway. :-) >
I was thinking you'd have it call on various functions defined elsewhere in the program, forcing him to pretty much have the whole original code in there. :) ChrisA -- http://mail.python.org/mailman/listinfo/python-list