In
<caajsdjgyexftzmrwu-geynan_9wbojog1jk35qbebr8mfp3...@mail.gmail.com>,
on 03/17/2015
at 09:14 AM, John McKown <[email protected]> said:
>I just had a thought (and it's lonely).
It's not my dog.
Violating system integrity is easy. Safely doing what Charlesv wanted
is much more difficult.
> SYNCHX (15) INVOKES PROGRAM B IN TCB KEY
Still able to walk all over your user key storage and yor subpool 0.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN