[Home] [By Thread] [By Date] [Recent Entries]


Michael Kay wrote:
> 
> Even back in the 1960s there were systems with rings of protection that
> allowed you to limit the resources that an executable had access to.
> Unix threw all that out in the interests of simplicity and portability.
> 

Check out Trusted Solaris. It gives you a stern warning and requires 
confirmation if you're copying from a window running an application that 
has access to sensitive information to a window running an application 
that is physicaly capable of writing information in places where 
sensitive information shouldn't end up :-)

> Michael Kay

ABS



Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member