Re: [SC-L] Programming languages used for security

2004-07-14 Thread ljknews
At 11:38 AM -0700 7/13/04, Blue Boar wrote: >ljknews wrote: >> The environment with which I am most familiar is VMS, and tradition >> is what guides secure interfaces. Inner mode code _must_ probe any >> arguments provided from an outer mode, probe the buffers specified >> by descriptors provided,

Re: [SC-L] Programming languages used for security

2004-07-14 Thread der Mouse
>> The environment with which I am most familiar is VMS, and tradition >> is what guides secure interfaces. Inner mode code _must_ probe any >> arguments provided from an outer mode, probe the buffers specified >> by descriptors provided, etc. > What do you do when you're handed a bad pointer? I

RE: [SC-L] Risk Analysis: Building Security In #3

2004-07-14 Thread Wall, Kevin
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of ljknews > Sent: Tuesday, July 13, 2004 8:37 AM Larry Kilgallen wrote... > At 5:30 PM -0600 7/12/04, Jared W. Robinson wrote: > >I read the paper, and found it interesting. I read the statistic "50 > >

Re: [SC-L] Programming languages used for security

2004-07-14 Thread Blue Boar
ljknews wrote: At 11:38 AM -0700 7/13/04, Blue Boar wrote: ljknews wrote: The environment with which I am most familiar is VMS, and tradition is what guides secure interfaces. Inner mode code _must_ probe any arguments provided from an outer mode, probe the buffers specified by descriptors provide

Re: [SC-L] Programming languages used for security

2004-07-14 Thread ljknews
At 10:39 AM -0700 7/14/04, Blue Boar wrote: >ljknews wrote: > >> At 11:38 AM -0700 7/13/04, Blue Boar wrote: >> >>>ljknews wrote: >>> The environment with which I am most familiar is VMS, and tradition is what guides secure interfaces. Inner mode code _must_ probe any arguments provid