15 Sep
2003
15 Sep
'03
1:15 p.m.
Josef Meile wrote:
Hi Chris, I'm just wondering what's different from your approach and what kind of problem I could have.
In my approach, I'm replaciong a defined method with a method of the same name, and a carefully named help method. These can both be protectde by security assertions easily. In your method, you're slapping an arbitarily named attribute into a class object. They're difficult to protect in a fine grained fashion, and if you're careless with your variable names you may squish something important that you didn't mean to... Chris