Re: ANNOUNCE: secure identd v0.3

From: Kragen (kragenat_private)
Date: Thu Sep 17 1998 - 05:40:08 PDT

  • Next message: Darren Reed: "Making "stealth" scans harder. (fwd)"

    On Wed, 16 Sep 1998, Wietse Venema wrote:
    > For example, when all data objects have limited size, and when the
    > number of objects instances is limited, so is the amount of memory
    > required to hold those objects.
    
    This is often not sufficient, though.  The canonical example is Unix
    limits -- it may be fine for a user to run 50 processes, and for a user
    to run a 75MB Emacs process, but that doesn't imply they ought to be
    able to run 50 75MB processes.
    
    Kragen
    
    --
    <kragenat_private>       Kragen Sitaker     <http://www.pobox.com/~kragen/>
    The sages do not believe that making no mistakes is a blessing. They believe,
    rather, that the great virtue of man lies in his ability to correct his
    mistakes and continually make a new man of himself.  -- Wang Yang-Ming
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:16:36 PDT