Re: How to....
From: Greg (security-basics_at_pchandyman.com.au)
To: <firstname.lastname@example.org> Date: Thu, 29 Sep 2005 07:31:25 +1000
----- Original Message -----
From: "Clarkson, Dustin" <email@example.com>
To: "Greg" <firstname.lastname@example.org>;
Sent: Wednesday, September 28, 2005 5:48 AM
Subject: RE: How to....
> This is stupid. You can always assign an icon to one application from
> another and trick someone into running it.
Exactly the thing that gets said before the shit hits the fan in the end.
You ought to recognise a problem by now.
> This is not low-level security at all, this is by design.
This isn't a design thing and if that is what you see it as, then you don't
realise what has happened. Look again.