Jason wrote: > > "John (EBo) David" wrote: > > observation. Now for which is the most secure: by what and whose > > criteria? > > When was the last time you saw a new remote exploit for software > written to run on an Apple 2 or a C64? > > (Yes, such things existed, just with dialup BBSes rather than TCP/IP.. > ) cool... I wonder if anyone could adapt CR to infect giga-pets! EBo --