[Home] [By Thread] [By Date] [Recent Entries]
Michael Kay wrote: > > Even back in the 1960s there were systems with rings of protection that > allowed you to limit the resources that an executable had access to. > Unix threw all that out in the interests of simplicity and portability. > Check out Trusted Solaris. It gives you a stern warning and requires confirmation if you're copying from a window running an application that has access to sensitive information to a window running an application that is physicaly capable of writing information in places where sensitive information shouldn't end up :-) > Michael Kay ABS
|

Cart



