next up previous contents
Next: Sticky Bits Up: Secure Programming Previous: File System Permissions   Contents

Security Hole: Programs Without Execute Permissions



Subsections

Cem Ozdogan 2007-05-16