>One could perhaps argue that a malicious user could trick some other code into 
>doing something it shouldn't by virtue of being able to place arbitrary data 
>into this piece of CSA, but that is certainly the
fault of that other code's doing a bogus validity check. That kind of checking 
went out of fashion with DEBCHK in 1974.

But, shouldn't we protect the system from bad code?
-
Too busy driving to stop for gas!

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to