In <[EMAIL PROTECTED]>, on 02/23/2008
   at 10:07 AM, Walt Farrell <[EMAIL PROTECTED]> said:

>One could argue that letting you determine your access to resources
>without actually trying to use them (and thus without causing audit
>records) is a form of hacking.

Perhaps, but some IBM code does exactly that, and for what seems to be
good cause. I don't recall the details, but it was discussed here in the
last few years.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to