Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 2 Apr 2001 19:11:51 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 2 Apr 2001 19:11:41 -0400 Received: from blackhole.compendium-tech.com ([206.55.153.26]:40953 "EHLO sol.compendium-tech.com") by vger.kernel.org with ESMTP id ; Mon, 2 Apr 2001 19:11:26 -0400 Date: Mon, 2 Apr 2001 16:10:06 -0700 (PDT) From: "Dr. Kelsey Hudson" To: Jesse Pollard cc: Shawn Starr , Matti Aarnio , Subject: Re: Disturbing news.. In-Reply-To: <01032806093901.11349@tabby> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 28 Mar 2001, Jesse Pollard wrote: > Sure - very simple. If the execute bit is set on a file, don't allow > ANY write to the file. This does modify the permission bits slightly > but I don't think it is an unreasonable thing to have. Oh, honestly! Think about what you are saying here: What if you are developing something in an interpereted language such as perl or a shell script, where you *directly modify the executable file*? No, this won't work...Not wwithout being annoying as hell. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/