|
>-----Original Message----- >From: Dennis Knee [SMTP:dknee@norcal.org] >Sent: Thursday, May 01, 1997 9:17 PM >To: MIDRANGE-L@midrange.com >Subject: Re: Fwd: Emergency access > >A problem I see with this entire approach is that the programmer >could easily create a program of their own that adopts the higher >authority. - They could call that program, and do whatever they want. >- You would need to audit, and closely monitor what is happening. > >No necessarily. Under 3.6 (or is it 3.7? hmm must reread the doco) adopted >authority is a lot more closely examined. Programs are not able to adopt a >higher authority and you can curb some of your more inventive programmers in >their attempts to ignore/override whatever security you have set up. > > > James Turnbull > > > * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * This is the Midrange System Mailing List! To submit a new message, * * send your mail to "MIDRANGE-L@midrange.com". To unsubscribe from * * this list send email to MAJORDOMO@midrange.com and specify * * 'unsubscribe MIDRANGE-L' in the body of your message. Questions * * should be directed to the list owner / operator: david@midrange.com * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.