On approximately 7/28/2008 3:28 PM, came the following characters from the keyboard of Abigail: > On Mon, Jul 28, 2008 at 03:01:42PM -0700, Glenn Linderman wrote: >> On approximately 7/28/2008 2:26 PM, came the following characters from >> the keyboard of Sean O'Rourke: >>> Tels <nospam-abuse@bloodgate.com> writes: >>>> On Monday 28 July 2008 18:08:41 Abigail wrote: >>>>> In fact, the fast >>>>> majority of the Perl programmers out there doesn't read any >>>>> mailinglist, nor do they participate in anyway in the "Perl >>>>> community". Only a tiny minority has code on CPAN. >>>> So we are back to guesswork. I'd venture that "the vast majority of >>>> Perl programmers" doesn't know that using "<>" without -T is a >>>> security problem. >>> I'm just a single datapoint, but I find this feature useful, and >>> am hoping this whole thing ends up as just an endless mailing >>> list discussion. >> >> Maybe you should describe how it makes your life easier, and how you >> avoid the surprises (not using "funny" file names suffices for personal >> code, of course, but if you release code with this feature to others, >> how do you protect them?). > > > Please, don't make the assumption all code is intended to be shared. > Most code will never be distributed to run in uncontrolled environments. > Code is not broken because it may have strange effects when run in an > environment it was never intended to run in. Wouldn't think of making such an assumption! I _did_ say (and you quoted it, it is still up there) "if you release code with this feature to others" -- which is not an indication I made such an assumption, the way I understand English! On the other hand, useful code has a way of migrating to other environments besides those for which it was originally intended. I just sent a piece of code I wrote "only for me" to a friend of mine, because he needed it... -- Glenn -- http://nevcal.com/ =========================== A protocol is complete when there is nothing left to remove. -- Stuart Cheshire, Apple Computer, regarding Zero Configuration NetworkingThread Previous | Thread Next