[ < ] | [ > ] | [ << ] | [ Up ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
A few obvious security considerations are relevant to running untrusted
virtual code applications. These points are only as reliable as the
assumption that the avram
executable has not been modified to the
contrary.
--jail
command line option is used). The worst
they can do is use up a lot of memory, which can be prevented with the
ulimit
command. Unfortunately, not all applications are usable
in this mode.
--jail
). They have (read-only) access to environment variables, and to the files that are
indicated explicitly on the command line. If standard input is one of
the files (as indicated by the use of -
as a parameter), the
virtual code application may infer the current date and time. However,
a parameter mode application may write any file that the user has
permission to write. The ‘--ask-to-overwrite’ option should be
used for better security, or at least the ‘--quiet’ option should
not be used. The virtual code can neither override nor detect the use
of these options.
chroot
environment may be the only secure way of running
untrusted interactive applications.
[ < ] | [ > ] | [ << ] | [ Up ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
This document was generated on November 8, 2012 using texi2html 1.82.