In
<caajsdjgyexftzmrwu-geynan_9wbojog1jk35qbebr8mfp3...@mail.gmail.com>,
on 03/17/2015
   at 09:14 AM, John McKown <[email protected]> said:

>I just had a thought (and it's lonely).

It's not my dog.

Violating system integrity is easy. Safely doing what Charlesv wanted
is much more difficult.

>   SYNCHX (15) INVOKES PROGRAM B IN TCB KEY

Still able to walk all over your user key storage and yor subpool 0.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to