On Fri, 2002-09-27 at 11:47, [EMAIL PROTECTED] wrote:
> *** But what does prevent a user-level process from executing
> wild instructions (RESET, traps, other dangerous instructions
> and undocumented features) ?
I'm probably less knowledgeable then you are but in protected-mode
programming isn't the kernel responsible for making sure no programs go
rogue?
--
Ryan "leadZERO" Sommers
Gamer's Impact President
[EMAIL PROTECTED]
ICQ: 1019590
AIM/MSN: leadZERO
-= http://www.gamersimpact.com =-
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message