Hi,

This is an evil area for another reason. Most unix properly disallow this but MAC OSX does allow it. This is how some incredible malware is operating on my machine - access via USB outside operating system control. Apparently this is thought of as a feature and not a severe security flaw of Windows and MAC OSX.


Donna
[EMAIL PROTECTED]




On 12-Jul-07, at 9:23 PM, Robert Bernecky wrote:

Hi, Eric,

This is an evil area, in the sense that documentation on it
is hard (for me, anyway...) to find. Look here:

/etc/udev/rules.d/50-udev-default.rules

This directory has a number of other interesting files in it, such as:

/etc/udev/rules.d/85-mount-fstab.rules

I eventually stumbled into it after finding DVD burner permissions
changing AFTER I had changed the /dev entry to let me burn stuff
from my own account.

Bob


On Thu, 2007-07-12 at 16:41 -0400, Eric Iverson wrote:
I have been playing with J602 systems installed on a usb stick (thanks to
Bill Lam).

It works nicely on Windows but I have some questions for linux/ unix gurus.

The usb stick is automatically mounted by my Suse linux system. It was trivial to copy the J602 system over but I can't run it as it is mounted as noexec. I can manually unmount and remount without the noexec (su required) but this is a nuisance. Is there a way (sudo command) to just change the
noexec option after the device has been automatically mounted?

--------------------------------------------------------------------- - For information about J forums see http://www.jsoftware.com/ forums.htm

----------------------------------------------------------------------
For information about J forums see http://www.jsoftware.com/forums.htm

----------------------------------------------------------------------
For information about J forums see http://www.jsoftware.com/forums.htm

Reply via email to