I guess that since this has to be foolproof, then the only way to address the problem is to exclude the, um, fools.
Protect the program libraries in question, then allow only a closely audited user to execute the programs -- and then only via your shim. -- David Andrews A. Duda and Sons, Inc. [EMAIL PROTECTED] ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

