[ale] Executing User process in Kernel Mode
mr at 4securenet.com
mr at 4securenet.com
Fri May 9 07:22:57 EDT 2003
> Egads! Boy does that ever sound like a bad idea! Despite how safe they
> claim it is, there is always the chance of someone making a mistake and
> putting a non trusted binary in the trusted dir. This has "major
> security hole" written all over it...
>
> Mike
>
My thoughts exactly. Most of the efforts towards are to keep these two
things seperate. Again, it is always compromise between Usage (ease of
use, speed, etc) vs Security :-)
--Raju
> -------Original Message-------
> From: Raju <mr at 4securenet.com>
> Sent: 05/08/03 03:26 PM
> To: ale at ale.org
> Subject: [ale] Executing User process in Kernel Mode
>
>>
>>
> <a target=_blank
> href="http://www.yl.is.s.u-tokyo.ac.jp/~tosh/kml/">http://www.yl.is.s.u-tokyo.ac.jp/~tosh/kml/</a>
>
>
> Regards,
>
> Raju
> --
> mr at 4securenet.com
>
>
>
>
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> <a target=_blank
> href="http://www.ale.org/mailman/listinfo/ale">http://www.ale.org/mailman/listinfo/ale</a>
>>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale
_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale
More information about the Ale
mailing list