1. Security
- Posted by Mathew Hounsell <mfh03 at UOW.EDU.AU> Jun 07, 1999
- 420 views
[ Security ] I thought of a program that would be very useful. It is a code analyser. It searces a euphoria file for calls to system, allocate, set_vector, call, certain interrupts and other possiblely dangerous code. If it finds it it points it out to the user, this might make people happier about running code. With routine_id this would have to check for routine_ids on these same procedures. A more advanced program might do most of the checking itself. I'm saying this because I probablely wont have time to do it myself. It would be easy to reduce security worries.It would simple to produce the java sandbox model for eupohoria. There are two approaches. Copy the interpreter and rewrite the 'dangerous' parts of the secure interpreter to abort with security errors at these parts. The other approach is to redife the functions in the libraries and redefine any internal functions. RDS and others may want to do this for when they first run a dowloaded prog. That way they can analyse any suspect programs. They may want it to abort or just message. [ Type ] For security and power, as Euphoria provides low level facilities, a memory block address type would be useful. You could set it to point at a block of memory allocated and it would do bounds checking. It might be useful to have it set to index a set number of bytes up to 8 so it can fit into an atom. This would allow you index of it using standard index notation ------------------------- Sincerely, Mathew Hounsell mat.hounsell at excite.com
2. Re: Security
- Posted by Bernie Ryan <bwryan at PCOM.NET> Jun 07, 1999
- 418 views
If a program is not shrouded; you can visually lok at the code for problems. If the program is shrouded then only RDS can do anything about checking it. Solution don't use code that you don't trust or know the source of.
3. Security
- Posted by who at bellsouth.net Jan 04, 2003
- 391 views
Hello all, Im interested in knowing if anyone on the list is actively involved with computer security that could point me to some websites I might find usefull in my quest to protect myself.... Namely Anonymous [tomorrow "who" knows]
4. Security
- Posted by who at bellsouth.net Jan 04, 2003
- 376 views
Security, a good way to stop abuse is to email: uce at ftc.gov include email headers and attachments Let the government do the job! Who -> me