Maybe you just need a way to validate code before executing. Something
like a PGP-signed code segment that would (a) generally insure that the
code isn't a trojan horse, and (b) even if it was, you'd have a pretty
good idea where it came from. Still, not perfect, but better.
-- Dave Brennan HaL Computer Systems, Austin, TX, USA brennan@hal.com http://www.hal.com/~brennan