Back to the main page

Mailing List Logs for ShadowRN

From: Ereskanti <Ereskanti@***.COM>
Subject: Re: Security tallies (was Re: Weird Campaigns)
Date: Sun, 24 May 1998 11:11:02 EDT
In a message dated 5/23/98 7:39:43 PM US Eastern Standard Time,
gurth@******.NL writes:

> > I'm probably way out of date here. (Only having the SR1BBB can do that
> > to ya) but I thought that's what happened when you entered the CPU..
> > once there the whole system (including security stuff) is yours to
> > monkey with.
>
> I'm not sure, but I don't believe you can try and set yourself up as a
> legitmate user in SR1/VR1.0/SRII matrix rules.
>
Actually, what Karl was suggesting (did I get the name right?) is correct.
Once you are in the CPU for a system under the first ed rules, you can spends
actions to have the system perform certain actions. That includes locking out
nodes, rearranging files and file substructures (making it harder to find
things for instance), as well as giving/removing accessabilities to various
user(s).

-K

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.