Date: Tue, 15 Apr 2003 02:12:46 +0200 From: Daniela <dgw@liwest.at> To: Munehiro Matsuda <haro@h4.dion.ne.jp> Cc: emulation@freebsd.org Subject: Re: PECOFF support and VMware Message-ID: <200304150212.46474.dgw@liwest.at> In-Reply-To: <20030415.001329.74757355.haro@h4.dion.ne.jp> References: <200304140051.33056.dgw@liwest.at> <20030415.001329.74757355.haro@h4.dion.ne.jp>
next in thread | previous in thread | raw e-mail | index | archive | help
On Monday 14 April 2003 17:13, Munehiro Matsuda wrote: > From: Daniela <dgw@liwest.at> > Date: Mon, 14 Apr 2003 00:51:33 +0200 > > ::Hi all! > :: > ::I have some questions about the PECOFF_SUPPORT kernel option and vmwa= re3: > :: > ::When I include this option, can I run the PECOFF executables directly > :: (given that the files needed by the program are there) without other > :: programs? Is there any reason for not doing so (especially > :: security-related)? > > IIRC, PECOFF option was added to support the PEACE project. > See the follwoing URL for more info: > http://chiharu.haun.org/peace/ Seems pretty useful, but what about security? "In-kernel *.EXE loader" so= unds=20 much like "In-kernel Computer Virus Loader". :-) I'm a bit paranoid. Is it safe to install this?
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200304150212.46474.dgw>