Interesting question.  If you wouldn't mind sharing some of the
information you receive, I think it'd really help me understand how exit
functions are actually used in practice.

/j

On Thu, 22 Jul 2004, Elvis Budimlic wrote:

> I'm interested if anyone from Net-IQ or using their exit point security
> software can clear something up for me, by private email if possible.
>
> Does Net-IQ's exit point security product permit for "daisy chaining" of
> exit point programs?
>
> Basically, if one already exists at the time of install do they make sure it
> is invoked by their exit point program?
>
> And more importantly, does Net-IQ's exit point program know/care if it is
> "daisy chained" and invoked by another exit point program?
>
>
>
> Elvis
>
>
>
> --
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
> To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>
>


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.