>One could perhaps argue that a malicious user could trick some other code into >doing something it shouldn't by virtue of being able to place arbitrary data >into this piece of CSA, but that is certainly the fault of that other code's doing a bogus validity check. That kind of checking went out of fashion with DEBCHK in 1974.
But, shouldn't we protect the system from bad code? - Too busy driving to stop for gas! ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

