At 01:46 even 10/1/02 +0530, MJ wrote:
lead to to bad places. Agreed. But when you malloc you allocate /limited/ memory too. There is /no/ way to prevent you from overflowing an allocated buffer if you so wish.
I think the thing with a fixed-sized array on the stack is that a buffer overrun will more certainly overwrite the program code which is far more dangerous than overwriting some random memory.
which is true. But a seg fault is also not too good a thing for one's program to do.