delorie.com/archives/browse.cgi   search  
Mail Archives: djgpp/2000/09/27/10:08:27

Date: Wed, 27 Sep 2000 19:45:44 +0600 (LKT)
From: Kalum Somaratna aka Grendel <kalum AT lintux DOT cx>
X-Sender: kalum AT goatbeard DOT grendel DOT net
To: Nate Eldredge <neldredge AT hmc DOT edu>
cc: djgpp AT delorie DOT com
Subject: Re: Rebooting the PC
In-Reply-To: <83vgvjavzx.fsf@mercury.st.hmc.edu>
Message-ID: <Pine.LNX.4.21.0009271941340.1199-100000@goatbeard.grendel.net>
MIME-Version: 1.0
Reply-To: djgpp AT delorie DOT com
Errors-To: nobody AT delorie DOT com
X-Mailing-List: djgpp AT delorie DOT com
X-Unsubscribes-To: listserv AT delorie DOT com

On  26 Sep 2000, Nate Eldredge decided to enlighten us with,

> Kalum Somaratna aka Grendel <kalum AT lintux DOT cx> writes:

> > Shouldn't protected mode OS's like windoze trap this and prevent a CPU
> > reset hapenning???
> 
> Of course they should.  But this would also break all the DOS programs
> that tweak the hardware at low levels, so they don't.

BTW assuming that there is a disk cache with write caching enabled
running, would it intercept such a port write and then allow it after it
flushes its write buffer?

If the above doesn't happen then it would be very dangerous indeed to use
it..as you might find a bad fat and lots of other problems after the
reboot...

> Linux does forbid this manner of tomfoolery (except for root, and even
> then it takes special measures).

Thats why we all love Linux..... it is 100% secure, you can visit any
site, and read any mail with confidence that there is no such thing as a
virus as far as linux is concerned :)

Best Wishes,
Grendel

--
.---------------------.---------------------.----{)--.
| /"__ ._ _  _  _| _ |`-.grendel AT lintux DOT cx.-'(]__/|| |
| \__/ | (-'| |(_|(-'l_ `-===============-' [_]  .-: |
`--------------------------------------------/|\/| |-'


- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019