aboutsummaryrefslogtreecommitdiff
path: root/destructive_interference.mdwn
diff options
context:
space:
mode:
Diffstat (limited to 'destructive_interference.mdwn')
-rw-r--r--destructive_interference.mdwn25
1 files changed, 9 insertions, 16 deletions
diff --git a/destructive_interference.mdwn b/destructive_interference.mdwn
index 941da8a4..1f468034 100644
--- a/destructive_interference.mdwn
+++ b/destructive_interference.mdwn
@@ -1,19 +1,12 @@
-[[license text="""
-Copyright © 2007 Free Software Foundation, Inc.
+[[!meta copyright="Copyright © 2007, 2008 Free Software Foundation, Inc."]]
-Permission is granted to copy, distribute and/or modify this document under the
-terms of the GNU Free Documentation License, Version 1.2 or any later version
-published by the Free Software Foundation; with no Invariant Sections, no
-Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included
-in the section entitled [[GNU_Free_Documentation_License|/fdl.txt]].
-
-By contributing to this page, you agree to assign copyright for your
-contribution to the Free Software Foundation. The Free Software Foundation
-promises to always use either a verbatim copying license or a free
-documentation license when publishing your contribution. We grant you back all
-your rights under copyright, including the rights to copy, modify, and
-redistribute your contributions.
-"""]]
+[[!meta license="""[[!toggle id="license" text="GFDL 1.2+"]][[!toggleable
+id="license" text="Permission is granted to copy, distribute and/or modify this
+document under the terms of the GNU Free Documentation License, Version 1.2 or
+any later version published by the Free Software Foundation; with no Invariant
+Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license
+is included in the section entitled
+[[GNU Free Documentation License|/fdl]]."]]"""]]
Interference can be destructive or non-destructive. When a [[principal]]
invokes an object (thereby requesting a service) and the implementation
@@ -26,7 +19,7 @@ the Solitaire program is instantiated and given all of the user's
authority. The program may delete all of the users files after
publishing credit card and other sensitive information on the Internet.
This type of interference is undesirable, however, generally practically
-unavoidable due to the way programs work on Windows (and Unix, for that
+unavoidable due to the way programs work on Windows (and [[Unix]], for that
matter).
The problem is that the callee has induced negative consequence for caller