Content deleted Content added
→''access'' Example: access still has utility in other circumstances |
revert - I was incorrect |
||
Line 24:
Although this sequence of events requires precise timing, it is possible for an attacker to arrange such conditions without too much difficulty.
The implication is that the ''access'' system call, as it currently exists in Unix, should never be used
== References ==
|