"Emanuele D'Arrigo" <[EMAIL PROTECTED]> writes:
> My target OS however are XP and Vista. I did find chroot-like
> features in various virtualization platforms for those OS, but it
> would definitely be overkill to request the user that he installs a
> virtualization software to run a small applica
Thanks to those who replied and sorry for not having replied sooner.
Ok, got the message: chroot jail. I understand chroot is available for
unix-like OS as a kernel-provided facility. If I was developing for,
say, Linux or maybe even MacOSX, it might even be easy. My target OS
however are XP and V
In article <[EMAIL PROTECTED]>,
Ben Finney <[EMAIL PROTECTED]> wrote:
> "Emanuele D'Arrigo" <[EMAIL PROTECTED]> writes:
>
> > On Nov 1, 12:44Â am, Lawrence D'Oliveiro wrote:
> > > I think the most reliable solution is to take advantage of a level
> > > in the system that already has to provide p
"Emanuele D'Arrigo" <[EMAIL PROTECTED]> writes:
> On Nov 1, 12:44 am, Lawrence D'Oliveiro wrote:
> > I think the most reliable solution is to take advantage of a level
> > in the system that already has to provide protection against
> > malicious code: use a chroot jail.
[…]
>
> [sigh] That sound
On Nov 1, 12:44 am, Lawrence D'Oliveiro wrote:
> I think the most reliable solution is to take advantage of a level in the
> system that already has to provide protection against malicious code: use a
> chroot jail. Or run a complete virtualized machine with its own OS
> installation. Then the code
In message
<[EMAIL PROTECTED]>,
Emanuele D'Arrigo wrote:
> I noticed that this issue has been discussed in this newsgroup
> periodically over the years and I seem to understand that -
> comprehensive- safe/restricted execution of untrusted code in python
I think the most rel
On Oct 30, 8:50 pm, Aaron Brady <[EMAIL PROTECTED]> wrote:
> Otherwise, you might be able to remove access to it by modifying
> however it is the 'cust' list is obtained. Perhaps you can use the
> technique that's used to change the value of integers. Keep us
> posted. Does this give you any ide
I seem to understand that -
> > comprehensive- safe/restricted execution of untrusted code in python
> > is currently quite hard to achieve.
>
> > What if the safety requirements are a little relaxed though? All I'd
> > want to prevent is for the code opening/damaging fi
On Oct 30, 6:35 am, "Emanuele D'Arrigo" <[EMAIL PROTECTED]> wrote:
> I noticed that this issue has been discussed in this newsgroup
> periodically over the years and I seem to understand that -
> comprehensive- safe/restricted execution of untrusted code in pytho
I noticed that this issue has been discussed in this newsgroup
periodically over the years and I seem to understand that -
comprehensive- safe/restricted execution of untrusted code in python
is currently quite hard to achieve.
What if the safety requirements are a little relaxed though? All I
10 matches
Mail list logo