>In short, this parameter is makes the stack non-executable to help >prevent buffer overflow exploits. >I can find a lot of info about setting this on Solaris, but very little >about doing so on Linux. >Has anyone here used this parameter on Linux? I think the closest thing to the parameter that you are looking above on Linux is "kernel.exec-shield" Its enabled by default and should therefore not be a problem William -- //www.freelists.org/webpage/oracle-l