Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If it doesn't have root access you can run it in a dummy user account until it's patched.

Doesn't stop your machine from becoming a vector to attack other users on your contact list though.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: