Zak McGregor wrote:

>Now, for apps executed in such a way via Nautilus or GMC, perhaps it
>would be a good idea to have a sort of chrooted environment for those
>files to run in, and have the application revert the status of the file
>*back* to whatever it was prior to the execution of it via whichever
>interface was used to invoke it? That way, the clueless would only be
>able to execute it via the interface, which would run it in a clean
>environment and also protect the user from inadvertently running the
>executable via any other means. If the user wants to run the program
>through any other means, he would have to do the chmod +x himself,
>leaving the situation no worse off than without these ideas implemented
>in Nautilus...
>

Wouldn't work well that way.  What about the Ximian installer, or the 
RealPlayer installer?

You could do a sandbox like Java so it'd pop up a warning when a program 
tried to overstep boundaries, but I don't think it would be worth the 
coding effort.  User permissions are probably more that enough.  (unless 
luser is running as root, then he can discover why you don't do that!)

-b

-- 
 "One trend that bothers me is the glorification of
stupidity, that the media is reassuring people it's 
alright not to know anything. That to me is far more 
dangerous than a little pornography on the Internet." 
  - Carl Sagan




_______________________________________________
Mc mailing list
[EMAIL PROTECTED]
http://mail.gnome.org/mailman/listinfo/mc

Reply via email to