Beefy Boxes and Bandwidth Generously Provided by pair Networks
Your skill will accomplish
what the force of many cannot
 
PerlMonks  

Re^2: If I were the Pauper who found a security hole that allows privilege escalation, I'd

by runrig (Abbot)
on Jul 02, 2013 at 16:14 UTC ( #1042061=note: print w/replies, xml ) Need Help??


in reply to Re: If I were the Pauper who found a security hole that allows privilege escalation, I'd
in thread If I were the Pauper who found a security hole that allows privilege escalation, I'd

Why did you vote to reap the funniest answer?

Update: Nevermind...I know it must have been a case of E_NO_GET_JOKE :-)

  • Comment on Re^2: If I were the Pauper who found a security hole that allows privilege escalation, I'd

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://1042061]
help
Chatterbox?
[Corion]: choroba: Optimizing how Perl reads source code on startup (and then processes it line-by-line)
[Corion]: But in general, it seems to be an interesting approach I should think about - whenever I'm searching for something, to consider if I could search for the end of the token instead of the start of the token

How do I use this? | Other CB clients
Other Users?
Others romping around the Monastery: (9)
As of 2016-12-06 15:04 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    On a regular basis, I'm most likely to spy upon:













    Results (108 votes). Check out past polls.