"John (EBo) David" wrote: > observation. Now for which is the most secure: by what and whose > criteria? When was the last time you saw a new remote exploit for software written to run on an Apple 2 or a C64? (Yes, such things existed, just with dialup BBSes rather than TCP/IP.. ) -- jkenner @ mindspring . com__ I Support Linux: _> _ _ |_ _ _ _| Working Together To <__(_||_)| )| `(_|(_)(_| To Build A Better Future. |