TAILIEUCHUNG - Java 2 Network Security P2

The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You. | 2. The class file verifier which includes the bytecode verifier checks that the program obeys the rules of the Java Virtual Machine but note that this does not necessarily mean that it obeys the rules of the Java language . 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system and network access only to the location from which the code or its Web page came. You may wish for example to print something from an applet. You are unlikely to want your security manager to allow anyone to do that but you might allow access to especially trustworthy people. So you download the applet discover that it is located at a trustworthy URL address and encrypted with someone s private key check the accompanying public key certificate to make sure it is valid and identify someone especially trustworthy decrypt the applet with that public key and then allow it the necessary access. One important thing that distinguishes Java from other forms of executable content is that it has both the web of trust that signatures bring and the three security components to validate the downloaded code. These precautions are taken not because Java users are less trustful than others but because even the most trusted of code suppliers sometimes make mistakes or can have their systems compromised. Without the validation a web of trust can become a web of corruption if any one trusted site is successfully cracked. Java as a Threat to Security So in the absence of implementation errors either on the part of the browser vendors or on the part of computer operators administrators and systems programmers Java should be safe. The browser vendors have a good reputation for responding to reports of flaws in their implementations and one of the key purposes of this book is to help you avoid any .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.