Well OK - what "security problems" occur if you use CSH - remember Berkley
is CSH first SH second.
Actually why doesn't one of the true guru's define all the "security problems"
that you can get into with setuid programs in general. I am always willing
to learn something.
--
Peter Wolfe
Microtel Pacific Research
..decvax!microsoft!ubc-vision!mprvaxa!wolfe