Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Hah! But COME FROM is more insidious - no amount of following the chain of calls will reveal that something is lurking elsewhere in the program ready to redirect the control flow


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: