| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Sub-cellular life forms |
Mike Byrne wrote in a message to David Noon: DN> Perhaps you'd like to tell us how you would go about that from inside DN> a VDM. Remember that the descriptor tables are not even addressable DN> from within the VDM, let alone modifiable. MBy> I'm not a virus writer or anything, but I am curious. Are MBy> the descriptor tables not adressable even under DPMI or MBy> similar protected-mode protocols? Under DPMI, the client application has substantially the same access to memory as would a native OS/2 application. There are a couple of additional levels of indirection if you look under the hood, but the basic idea is the same. Since even a native OS/2 application has no destructive access to memory unless it can trick the operating system or a device driver into doing its dirty work, neither would a DOS DPMI application. -- Mike ---* Origin: N1BEE BBS +1 401 944 8498 V.34/V.FC/V.32bis/HST16.8 (1:323/107) SEEN-BY: 12/2442 620/243 624/50 632/348 640/820 690/660 711/409 410 413 430 SEEN-BY: 711/807 808 809 934 942 949 712/353 515 713/888 800/1 7877/2809 @PATH: 323/107 150 3615/50 229/2 12/2442 711/409 808 809 934 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.