Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

I've generally seen this with Unix installers from commercial software vendors.

You get a giant .sh file that displays a license, asks you to accept, then upon acceptance, cats itself, pipes through head/tail, into cpio to extract the actual assets.



view as:

Legal | privacy