-----------------------------------<snip>-----------------------------------
We had a *REALLY* good applications programmer that simply bypassed any
and all protections we had,
---------------------------------<unsnip>-------------------------------------------
I've found some really serious holes in vendor SVC code. One example was
a serious breach in the IDMS SVC, which I learned about from a security
auditor. The hard way.
Some vendors ASSUME that their code is inviolable, without proper
testing or safeguards. WAKE UP, FOLKS. Presence can and usually does
generate abuse.
Rick
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html