At 01:46 even 10/1/02 +0530, MJ wrote:
lead to to bad
places. Agreed. But when you malloc you
allocate /limited/ memory too. There is /no/ way to prevent
you from overflowing an allocated buffer if you so wish.
I think the thing with a fixed-sized array on the stack is that a buffer
overrun will more certainly overwrite the program code which is far more
dangerous than overwriting some random memory.
which is true. But a seg fault is also not too good a thing for one's
program to do.