| ▲ | pixl97 3 hours ago | |
>so they can do literally anything the OS is capable of doing Yea, over the years someone thought of something they wanted to do and then did it without a systematic consideration of what that level of power meant, especially as multi-user network connectivity and untrusted data became the norm. | ||
| ▲ | p_ing 3 hours ago | parent [-] | |
Those weren't a consideration when the NT OS/2 Design Workbook was being written. | ||