Hi, On Mittwoch, 20. Januar 2010, Lucas Nussbaum wrote: > There are two ways to attack that problem: how about the compromise and doing both, except that for (1) we file the bugs with severity important? cheers, Holger
Attachment:
signature.asc
Description: This is a digitally signed message part.