×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
Routine audits of the system audit logs looking for an security admin who gave themselves access to a file they don't need to access
-----Original Message-----
From: MIDRANGE-L [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of James H. H. Lampert
Sent: Monday, May 12, 2014 6:58 PM
To: Midrange Systems Technical Discussion
Subject: Morbid curiosity about a V7R2 feature.
This afternoon, I was presented with a magazine article about V7R2.
One of the things it mentioned was that it now includes the ability for security officers to give users authorities to files they themselves don't have access to.
I don't dispute the utility of such a functionality, but how on Earth can such a thing work, without an untrustworthy security officer giving himself (or anybody else) that authority?
--
JHHL
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options,
visit:
http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at
http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.