> On Oct 30, 2017, at 9:15 AM, Steve Smith <[email protected]> wrote:
> 
> There is no need here to document the exact methods the OP used to
> bypass restrictions and violate system integrity.  It's not hard to
> figure out if you have much experience.
> 
> Given access to an APF-authorized library, one can do whatever one
> wants, regardless of the "rules".
> 
> sas
Semi on topic.
 Have any of you seen the “video” that claims that they can bypass system 
integrity with one program?
I saw one such presentation and asked the golden question about update access 
to an APF library.
They never got around to answering my question.
BTW: IIRC it was some dog and pony show to sell you security. Its been a couple 
of months and I just don’t remember the name.

Ed


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to