Lists Home |
Date Index |
Michael Kay wrote:
> Even back in the 1960s there were systems with rings of protection that
> allowed you to limit the resources that an executable had access to.
> Unix threw all that out in the interests of simplicity and portability.
Check out Trusted Solaris. It gives you a stern warning and requires
confirmation if you're copying from a window running an application that
has access to sensitive information to a window running an application
that is physicaly capable of writing information in places where
sensitive information shouldn't end up :-)
> Michael Kay