Pete Shanahan [mailto:[EMAIL PROTECTED] writes:

 > I'm just wondering how flawed the implementation of the windows
 > paging model is that it would allow for this kind of breach. The
 > standard model I'm familiar with would simply flush the page from
 > memory, and would not keep a copy in the external page-file,
 > instead relying on the copy that already exists on the disk.

Perhaps the code in question is stored compressed, so that there is no verbatim 
copy already on disk.  (I have no clue if Windows does this.)

-Dave


_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to