Ken,

>>If an untrusted *person* has the system authorities necessary to change
programs in this way, then you have a lot worse things to worry about than
programs being modified to bypass tag checking, and should delete the
untrusted person!<<

I agree with you, but please do not forget to think about patched programs
that come from other sources. They could be in products you have purchased
or evaluated. They could come from something someone asked your operator to
restore onto the system. I believe that the most common form of a patched
program is one to make it run in system state. Can we be sure that these
patched programs have not also been patched to manufacture pointers. The
safest thing to do with something that you think may have been patched is
to retranslate or delete it. (Retranslating it will change it to user
state.) On the other hand, if you know and trust the source of the patched
programs on your system, then go ahead and use them.

Ed Fishel,
edfishel@US.IBM.COM



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.