[ale] Executing User process in Kernel Mode

mr at 4securenet.com mr at 4securenet.com
Fri May 9 07:22:57 EDT 2003



> Egads!  Boy does that ever sound like a bad idea!  Despite how safe they
> claim it is, there is always the chance of someone making a mistake and
> putting a non trusted binary in the trusted dir. This has "major
> security hole" written all over it...
>
> Mike
>

My thoughts exactly. Most of the efforts towards are to keep these two
things seperate. Again, it is always compromise between Usage (ease of
use, speed, etc) vs Security :-)

--Raju


> -------Original Message-------
> From: Raju <mr at 4securenet.com>
> Sent: 05/08/03 03:26 PM
> To: ale at ale.org
> Subject: [ale] Executing User process in Kernel Mode
>
>>
>>
> <a target=_blank
> href="http://www.yl.is.s.u-tokyo.ac.jp/~tosh/kml/">http://www.yl.is.s.u-tokyo.ac.jp/~tosh/kml/</a>
>
>
> Regards,
>
> Raju
> --
> mr at 4securenet.com
>
>
>
>
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> <a target=_blank
> href="http://www.ale.org/mailman/listinfo/ale">http://www.ale.org/mailman/listinfo/ale</a>
>>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale





_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale





More information about the Ale mailing list