On Tue, Nov 9, 2010 at 10:49 AM, Toshio Kuratomi <a.badger@xxxxxxxxx> wrote: > To me this criteria would be better expressed as "Does the application have > significant uses outside of attacking a system?" This should be more > specific than "malicious" and make more clear that nc does not fall under > this while SQLNinja does. I agree -- it can certainly be expressed more eloquently than I did in my quick explanation, and you're right on target with the types of differences we discussed in the Board meeting. -- Jared Smith Fedora Project Leader _______________________________________________ advisory-board mailing list advisory-board@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/advisory-board