> On Oct 30, 2017, at 9:15 AM, Steve Smith <[email protected]> wrote: > > There is no need here to document the exact methods the OP used to > bypass restrictions and violate system integrity. It's not hard to > figure out if you have much experience. > > Given access to an APF-authorized library, one can do whatever one > wants, regardless of the "rules". > > sas Semi on topic. Have any of you seen the “video” that claims that they can bypass system integrity with one program? I saw one such presentation and asked the golden question about update access to an APF library. They never got around to answering my question. BTW: IIRC it was some dog and pony show to sell you security. Its been a couple of months and I just don’t remember the name.
Ed ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
