from the someone-out-there-is-going-to-outlaw-ipods-now dept.
Zoner12 writes "CNet is reporting that Abe Usher has created an application that allows an iPod to scan corporate networks for files likely to contain sensitive
business data and download them, potentially stealing 100 megabytes in a few minutes. An insider threat would only need to plug the iPod into a computer's USB port."
How many Unix hacks does it take to change a light bulb?
Let's see, can you use a shell script for that or does it need a C program?