I guess that since this has to be foolproof, then the only way to
address the problem is to exclude the, um, fools.

Protect the program libraries in question, then allow only a closely
audited user to execute the programs -- and then only via your shim.

-- 
David Andrews
A. Duda and Sons, Inc.
[EMAIL PROTECTED]

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to