>>>>> "Geir" == Geir Magnusson <[EMAIL PROTECTED]> writes:

Dan> I've
Dan> never tried that, but Geir is right, I think it can be done if
Dan> you try hard enough.

>> In the second case, when there is a security manager, then, no, you
>> cannot get around the access controls, even with reflection.

Geir> Why would I have to "get around" the access controls?   I'm the VM. I
Geir> can do magic things, right?  (I should be able to...)

I thought we were talking about malicious user code.

Tom

Reply via email to