Hi,
This is an evil area for another reason. Most unix properly disallow
this but MAC OSX does allow it. This is how some incredible malware
is operating on my machine - access via USB outside operating system
control. Apparently this is thought of as a feature and not a severe
security flaw of Windows and MAC OSX.
Donna
[EMAIL PROTECTED]
On 12-Jul-07, at 9:23 PM, Robert Bernecky wrote:
Hi, Eric,
This is an evil area, in the sense that documentation on it
is hard (for me, anyway...) to find. Look here:
/etc/udev/rules.d/50-udev-default.rules
This directory has a number of other interesting files in it, such as:
/etc/udev/rules.d/85-mount-fstab.rules
I eventually stumbled into it after finding DVD burner permissions
changing AFTER I had changed the /dev entry to let me burn stuff
from my own account.
Bob
On Thu, 2007-07-12 at 16:41 -0400, Eric Iverson wrote:
I have been playing with J602 systems installed on a usb stick
(thanks to
Bill Lam).
It works nicely on Windows but I have some questions for linux/
unix gurus.
The usb stick is automatically mounted by my Suse linux system. It
was
trivial to copy the J602 system over but I can't run it as it is
mounted as
noexec. I can manually unmount and remount without the noexec (su
required)
but this is a nuisance. Is there a way (sudo command) to just
change the
noexec option after the device has been automatically mounted?
---------------------------------------------------------------------
-
For information about J forums see http://www.jsoftware.com/
forums.htm
----------------------------------------------------------------------
For information about J forums see http://www.jsoftware.com/forums.htm
----------------------------------------------------------------------
For information about J forums see http://www.jsoftware.com/forums.htm