On Tue Apr 27 00:31:03 EDT 2010, news...@lava.net wrote:
> What about some mounting/binding hackery where you replace
> /dev/cons so that the original "cpu" command works?

why the resistance to il?  rx is a good example of il's strengths.
in order for cpu to work, it uses 2 extra processes.  rx is much
more efficient.  (and 1/4 the code) great for your trusted network.
or perhaps your local supercomputer.

rx doesn't do encryption.  a srx using ssl/tls would be
able to sneak a 0 write through since the record layer
should expand that into a application record with
application data length of 0.

- erik

Reply via email to