Feature added by: Sławomir Lach (Lachu)
Feature #318458, revision 1
Title: Reading user process memory
Requested by: Sławomir Lach (lachu)
Partner organization: openSUSE.org
Reading user's process memory or writting to it is very bad think. Malware can stole
passwords or change settings of application.
I have two idea about solving this issue: 1. Dissallow to debug(reading/writting memory)
process placed in /bin, /sbin, /usr/bin, /usr/sbin 2. Dissallow to debug(reading/writting
memory) process of file not belonging to user, who execute file.