On Dec 9, 2009, at 4:23 AM, Alastair Houghton wrote: > Specifically, a potential attacker will deliberately not follow this > convention. The Security Server used to get the information for the program > name in this manner, which created quite an interesting vulnerability since > you could get it to display an authorisation dialog with *any* name you > wanted in it. I blogged about that particular security hole some time ago:
Drifting far afield from Cocoa... but it seems that there isn't a good Cocoa solution for this. Snow Leopard has a very good audit trail system with a live audit stream /dev/auditpipe. With a little work, this could potentially be used to map process IDs to the disk image they are running. Todd _______________________________________________ Cocoa-dev mailing list (Cocoa-dev@lists.apple.com) Please do not post admin requests or moderator comments to the list. Contact the moderators at cocoa-dev-admins(at)lists.apple.com Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com This email sent to arch...@mail-archive.com