[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Hurdish applications for persistence
From: |
Alfred M\. Szmidt |
Subject: |
Re: Hurdish applications for persistence |
Date: |
Thu, 13 Oct 2005 11:15:21 +0200 |
Actually, any kind of security would already be good enough for me.
Then why not `not use chroot(), and use sub-hurd'?
I read your other mail in response to mine. I see many claims in
it, but no arguments. Thus, I can't response beyond what I already
said on the issue, which I won't repeat.
I don't see any claims in my messages. Maybe you should reread it,
and the previous ones.
Re: Hurdish applications for persistence, Marcus Brinkmann, 2005/10/12
- Re: Hurdish applications for persistence, Jonathan S. Shapiro, 2005/10/12
- Re: Hurdish applications for persistence, Alfred M\. Szmidt, 2005/10/13
- Re: Hurdish applications for persistence, Marcus Brinkmann, 2005/10/13
- Re: Hurdish applications for persistence,
Alfred M\. Szmidt <=
- Re: Hurdish applications for persistence, Marcus Brinkmann, 2005/10/13
- Re: Hurdish applications for persistence, Alfred M\. Szmidt, 2005/10/13
- Re: Hurdish applications for persistence, Marcus Brinkmann, 2005/10/13
- Re: Hurdish applications for persistence, Alfred M\. Szmidt, 2005/10/13
- Re: Hurdish applications for persistence, Marcus Brinkmann, 2005/10/13
Re: Hurdish applications for persistence, Bas Wijnen, 2005/10/13
Re: Hurdish applications for persistence, Alfred M\. Szmidt, 2005/10/13
Re: Hurdish applications for persistence, Jonathan S. Shapiro, 2005/10/13
Re: Hurdish applications for persistence, Jonathan S. Shapiro, 2005/10/13
Re: Hurdish applications for persistence, ness, 2005/10/11