Arthur T. wrote:

     Ed Jaffe snipped too much.  Take a look at more of Gil's post:

On the other hand, anyone who worked at the same shop for a long time knows
how to "trick" its systems. How to run jobs with any jobclass (and maybe
form some kind of a denial of service attack?), how passwords are managed, who are the powerful users, what resources are not properly protected, how
to falsify identities under CICS/IMS, how to run batch jobs under other
users, how to become APF-authorized, how to utilize error in 3rd party
products, and the list goes on


I didn't snip too much. I just snipped the parts that (IMHO) become irrelevant once one knows how to be come APF authorized.

--
-----------------------------------------------------------------
| Edward E. Jaffe                |                                |
| Mgr, Research & Development    | [EMAIL PROTECTED]    |
| Phoenix Software International | Tel: (310) 338-0400 x318       |
| 5200 W Century Blvd, Suite 800 | Fax: (310) 338-0801            |
| Los Angeles, CA 90045          | http://www.phoenixsoftware.com |
-----------------------------------------------------------------

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to