In the process of hosting the Oblique Strategies stuff, I found that the randomizer wasn’t very random. Unfortunately, a lot of the stuff you find on the Internet is out of date: this is an example. This code dates from 1996, an eternity ago.
From the srand page at www.perldoc.com:
Note that you need something much more random than the default seed for cryptographic purposes. Checksumming the compressed output of one or more rapidly changing operating system status programs is the usual method. For example:
srand (time ^ $$ ^ unpack “%L*”, `ps axww | gzip`);
Seems to work much better now.