Code Access Security in Mono

Sebastien has two nice articles: Graphs to visualize security demands and the fourth part on the series of the Mono Security Manager.

Sebastien is using the Cecil introspection library by JB to extract the CIL bytecodes and trace the use of the security manager.

Mexican Coup, part 2

Carlos Alberto points to an article with quotes from around the world on the recently staged coup. And has details on Mexican Ambassador to the US campaign to stick his foot in his mouth. He is mailing newspapers trying to justify the coup staged against Mexico City's major by the federal government.

He is arguing that technically they are allowed to use a technicality to block Lopez Obrador from running for the presidency.

Sign the petition online against the Fox coup: here

Posted on 20 Apr 2005 by Miguel de Icaza
This is a personal web page. Things said here do not represent the position of my employer.