>>>>> "Geir" == Geir Magnusson <[EMAIL PROTECTED]> writes:
Dan> I've Dan> never tried that, but Geir is right, I think it can be done if Dan> you try hard enough. >> In the second case, when there is a security manager, then, no, you >> cannot get around the access controls, even with reflection. Geir> Why would I have to "get around" the access controls? I'm the VM. I Geir> can do magic things, right? (I should be able to...) I thought we were talking about malicious user code. Tom
