From: | Ereskanti <Ereskanti@***.COM> |
---|---|
Subject: | Re: Security tallies (was Re: Weird Campaigns) |
Date: | Sun, 24 May 1998 11:11:02 EDT |
gurth@******.NL writes:
> > I'm probably way out of date here. (Only having the SR1BBB can do that
> > to ya) but I thought that's what happened when you entered the CPU..
> > once there the whole system (including security stuff) is yours to
> > monkey with.
>
> I'm not sure, but I don't believe you can try and set yourself up as a
> legitmate user in SR1/VR1.0/SRII matrix rules.
>
Actually, what Karl was suggesting (did I get the name right?) is correct.
Once you are in the CPU for a system under the first ed rules, you can spends
actions to have the system perform certain actions. That includes locking out
nodes, rearranging files and file substructures (making it harder to find
things for instance), as well as giving/removing accessabilities to various
user(s).
-K