home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!olivea!news.bbn.com!mips2!thed.uk22.bull.com!kelvin
- From: kelvin@thed.uk22.bull.com (Kelvin J. Hill)
- Newsgroups: bull.sys.aix,comp.unix.aix
- Subject: Re: Changing name associated with a process
- Message-ID: <kelvin.711888803@thed.uk22.bull.com>
- Date: 23 Jul 92 10:53:23 GMT
- References: <mwarren.711724488@rws1> <mwarren.711816903@rws1> <kelvin.711819412@thed.uk22.bull.com> <1992Jul22.234401.3114@cass.ma02.bull.com>
- Sender: news@mips2.ma30.bull.com (Usenet News Manager)
- Organization: Bull HN Informations Systems Inc.
- Lines: 14
-
- My comment re security violation was more to do with the ability to modify
- address pointers which are presumably outside the users program. If we can
- modify the argv[0] value on a machine wide basis, what else can we modify?
-
- Agreed on the concept of hiding 'sensitive' command line args, but I see the
- probability that the same method could be used to disguise a trojan program.
-
- Comments?
-
- Kelvin
- --
- Kelvin J. Hill - BULL HN Information System Ltd, Hounslow, England, UK.
- Internet - kelvin@thed.uk22.bull.com | UUCP - kelvin@cix.compulink.co.uk
- "" kelvin@kelvin.uk22.bull.com | AMPRnet - kelvin@g1emm.ampr.org
-