Am 22.11.2019 um 22:56 schrieb Joe Pluta <joepluta@xxxxxxxxxxxxxxxxx>:
I am asking. Not getting very responsive replies. I get the sense their offended that I would even ask. :P
That would be the point where I'd truly consider a vendor change. D/A/D access allows not only to do really nasty harm to the system itself but can also be exploited for elevating rights for ordinary *PGM objects, for whatever your imagination will show you. See Leif's Book about Machine Level programming (and a *lot* of technical insights) for details. After reading you'd probably even more reluctant to give SST access. ;-)
However, if an external company gets some work to do for me and they need special authorities, they'll need to explain. You won't let a plumber go into the archives in the basement when he can't tell you that there are pipes to service but tells you just "I need to be there". That's my impression from your writing.
Of course, I don't know details about the whole thing, service contracts, machines probably leased and not yours, and whatnot. So maybe my opinion doesn't really apply.
PGP-Key: DDD3 4ABF 6413 38DE - https://www.pocnet.net/poc-key.asc
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.