-----------------------------------<snip>-----------------------------------
We had a *REALLY* good applications programmer that simply bypassed any and all protections we had,
---------------------------------<unsnip>-------------------------------------------
I've found some really serious holes in vendor SVC code. One example was a serious breach in the IDMS SVC, which I learned about from a security auditor. The hard way.

Some vendors ASSUME that their code is inviolable, without proper testing or safeguards. WAKE UP, FOLKS. Presence can and usually does generate abuse.

Rick

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to