Ok, I confess: I was genuinely worried about clicking the links in Alex's piece. That proves the potency of this exploration of the tools and vocabulary of the internet underworld.
Your piece, WYSIWIG, shows in a strong way that a program is just a text file -- only once this file is compiled, interpreted, run or even read, that's when it is activated. By including the "Confidential Business Proposal" as part of your code, you've made this distinction extremely clear. "Running" any of these programs could cause great harm and like many hacks, the user/recipient is the most important step in execution -- unwittingly running a mysterious executable or sending off signed blank letterhead to Nigeria. CODeDOC also wants to include reading in the execution loop, and your piece eases them into that process. In fact, your work is better read than executed for the majority of us! It also reminds me that most artwork is experience through documentation rather than personal experience. As a side-note, this is also the only truly useful client in the CODeDOC pantheon.
Alex's piece is unique in that it has no "front end" and is simply an appreciation of the code and, in this case, very much of what that code can be used for. I can't say I was reticent to click on the links like Martin was, I figured Alex is savvy enough not to destroy the computers of visitors to the Whitney Museum. What's interesting here is just how simple it is to hack a Hotmail password, or create an email worm, particularly when the user's software is so blatantly vulnerable to it, as is the case with Outlook and Hotmail. Hmmm, both are Microsoft products.