On Fri, 14 Nov 2014 18:31:23 -0500, Farley, Peter x23353 wrote: >I have often thought it was a mistaken design by IBM that prohibits >non-authorized programmers from exploiting multiple address spaces >and instruction-level space-switching facilities.
How would you propose that such non-authorized programs access only the other address spaces that they were permitted to access? In other words, how would you protect the integrity of all address spaces if unauthorized code were able to access other address spaces? -- Tom Marchant
