Secure Passwords in Memory
Eric Gillespie, Jr.
epg at progenylinux.com
Sun Oct 1 18:04:49 EDT 2000
More information about the Python-list mailing list
Sun Oct 1 18:04:49 EDT 2000
- Previous message (by thread): Secure Passwords in Memory
- Next message (by thread): New Python development process (SourceForge considered Harmful?)
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
On Sun, Oct 01, 2000 at 05:31:56PM -0400, Peter Hansen <peter at engcorp.com> wrote: > Without having *full* control over the region of memory where the > password is stored, you're probably wasting much of your time with this > and lulling yourself or your users into a false sense of security. But isn't it true that only root can look in those places? If not, then i don't see that there's much i can do about this. Forcing the user to login as root is not an option. -- Eric Gillespie, Jr. <*> epg at progenylinux.com Software Developer Progeny Linux Systems - http://progenylinux.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 240 bytes Desc: not available URL: <http://mail.python.org/pipermail/python-list/attachments/20001001/f50b061f/attachment.sig>
- Previous message (by thread): Secure Passwords in Memory
- Next message (by thread): New Python development process (SourceForge considered Harmful?)
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the Python-list mailing list