On Jun 5, 2005, at 2:06 PM, Tom Tromey wrote:

"Geir" == Geir Magnusson <[EMAIL PROTECTED]> writes:


Dan> I've
Dan> never tried that, but Geir is right, I think it can be done if
Dan> you try hard enough.


In the second case, when there is a security manager, then, no, you
cannot get around the access controls, even with reflection.


Geir> Why would I have to "get around" the access controls? I'm the VM. I
Geir> can do magic things, right?  (I should be able to...)

I thought we were talking about malicious user code.

Ah - sorry. I was tired and on a plane home from Brazil. I though we were talking about how the code running in the context of the VM (as opposed to user code) could get ahold of the necessary classes (and protect them from malicious user code)

geir


Tom



--
Geir Magnusson Jr                                  +1-203-665-6437
[EMAIL PROTECTED]


Reply via email to