... not a good idea if it belongs to you. Now, most computers-- Let's examine, for a ...
... you create this enormous security vulnerability. You now have a program running that users ...