What about installations using their install script on an otherwise secure Linux machine?
reply