Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.lang.java.security > #40
| From | "towardajavastandard" <towardajavastandard@THRWHITE.remove-dii-this> |
|---|---|
| Subject | Real work examples of cus |
| Message-ID | <1193401935.155494.17850@o80g2000hse.googlegroups.com> (permalink) |
| Newsgroups | comp.lang.java.security |
| Date | 2011-04-27 16:07 +0000 |
| Organization | TDS.net |
To: comp.lang.java.security To people writing production software: When, if ever, have you used custom permissions, as described here: http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2 Is this only effective at providing resource protection for users of an application? Does it provide any protection against malicious code? ----- Your response will help in developing a java secure coding standard. --- * Synchronet * The Whitehouse BBS --- whitehouse.hulds.com --- check it out free usenet! --- Synchronet 3.15a-Win32 NewsLink 1.92 Time Warp of the Future BBS - telnet://time.synchro.net:24
Back to comp.lang.java.security | Previous | Next | Find similar
Real work examples of cus "towardajavastandard" <towardajavastandard@THRWHITE.remove-dii-this> - 2011-04-27 16:07 +0000
csiph-web