Comment Reminiscing (Score 1) 192
The best part of the entire linked-to page was the email addressing at the bottom of the announcement. UUCP paths. Those truly were the days.
it is highly secure as the code is analyzed before executing to make sure it won't do anything macilious.
That's not highly secure. That's a challenge.
Given that Zones can have:
different login identities
different network interfaces
different hostnames
different hardware available to them (disks, adapters, etc.)
be configured to use resource pools thus different amounts of cpu, floating or fixed
Yes, I'd say they are much more useful than chroot.
All seems condemned in the long run to approximate a state akin to Gaussian noise. -- James Martin