On Fri, 2002-09-27 at 11:47, [EMAIL PROTECTED] wrote:
> *** But what does prevent a user-level process from executing
> wild instructions (RESET, traps, other dangerous instructions
> and undocumented features) ?

I'm probably less knowledgeable then you are but in protected-mode
programming isn't the kernel responsible for making sure no programs go
rogue?

-- 
Ryan "leadZERO" Sommers
Gamer's Impact President
[EMAIL PROTECTED]
ICQ: 1019590
AIM/MSN: leadZERO

-= http://www.gamersimpact.com =-


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to