Re: Running Applications

Bob Jernigan (jern@spaceaix.jhuapl.edu)
Fri, 11 Oct 1996 10:02:32 -0500 (EDT)


From: jern@spaceaix.jhuapl.edu (Bob Jernigan)
Message-Id: <9610111402.AA20036@sdrmis.jhuapl.edu>
Subject: Re: Running Applications
To: nakor@glasswings.com.au (Stuart Young)
Date: Fri, 11 Oct 1996 10:02:32 -0500 (EDT)
Cc: jern@spaceaix.jhuapl.edu, francis@di.uminho.pt, www-html@w3.org,
In-Reply-To: <Pine.LNX.3.91.961012000105.16929C-100000@fizzgig.glasswings.com.au> from "Stuart Young" at Oct 12, 96 00:02:21 am

Stuart Young wrote:
> 
> On Fri, 11 Oct 1996, Bob Jernigan wrote:
> 
> > This can be done but do you really want to?  Just to be sure I know
> > what you're asking, you want to configure your browser so that when
> > you click a url like "http://disk.destroyer.ugh/erasedsk.exe", the
> > executable will immediately destroy your disk.  Is that what
> > you want?
> 
> I believe he's intending to use this on local/company intranet where all 
> data is a known quantity, not on the general WWW, where anything could 
> happen.
> 
The problem with the intranet is that many intranets allow user to
connect to the Internet.  If you can be sure that the firewall crew
will block dangerous references you may be ok.  I had .exe applications
for awhile but turned the off a couple of years ago because I couldn't
guarantee that something wouldn't leak through.

bob