Hi,

In message "re: Security bug in load()"
    on 02/04/30, Teague Sheridan <teague / apicom.com> writes:
|
|Thanks for the quick reply.  However, it still does not work :(  I'm
|hesitant to use a $SAFE of 2, since it would still be possible for a
|script to modify the environment I create for it.

|b.rb:9:in `load': loading from unsafe file e:/code/ft/client/hellomsg.rb

Hmm, DOSISH restriction.  Since I have no knowledge about the Win32,
our Win32 maintainer might find solution for your case.

|I do wonder why the console is an unsafe target for puts though ;) 
|Won't need it for my scripting but it's a strange restriction.

All IO is restricted from the sandbox.  It might not be the console.

							matz.