[Home] [Groups] - Message: [Prev in Group] [Next in Group]
7853: [MUD-Dev] Re: Scripting Design Notes
[Full Header] [Plain Text]
From: Chris Gray <cg@ami-cg.GraySage.Edmonton.AB.CA>
Newsgroups: nu.kanga.list.mud-dev
Date: Mon, 20 Jul 1998 00:11:15 -0600
Organization: Kanga.Nu
[Vadim Tkachenko:]
>> However, you are still vulnerable.
>
>Can you please elaborate on that?
I'm not as up on Java as you are, so I could easily be wrong. What I
was thinking about was using the ClassLoader stuff. However, if a
security manager prevents that, perhaps you'd be OK - I don't know
enough to say.
[Side note: even Java 1.2 has a security hole with Applets run under
the latest Netscape (but not Internet Explorer or HotJava). It's a
ClassLoader attack. See the comp.risks newsgroup for pointers (I don't
claim to understand it!)]