A simulated access environment overrides function calls pertaining to
resources for which the user may be restricted from accessing. The
environment also allocates and manages replacement resources that are
used in place of access-restricted computing resources in order to enable
execution of utilities or applications that would normally abort without
enhanced user permissions. In one embodiment, replacement resources are
managed by a resource mirror. In certain embodiments, the function calls
are statically overridden by linking a replacement library to the
utilities or applications. In other embodiments, the function calls are
dynamically overridden via software interrupts, replacing entries within
a function table, dynamically loading a replacement library, or the like.