next up previous contents
Next: Real and Effective IDs Up: Security Hole: Programs Without Previous: Security Hole: Programs Without   Contents

Sticky Bits


next up previous contents
Next: Real and Effective IDs Up: Security Hole: Programs Without Previous: Security Hole: Programs Without   Contents
Cem Ozdogan 2007-05-16