In <[email protected]>, on
04/28/2010
   at 10:44 PM, Tony Harminc <[email protected]> said:

>MVT had no system integrity or security at all. Password "security" was
>trivially bypassed,

Only by those who knew how to get into key 0. If you neglect to protect
PASSWORD, that's you fault, not MVT's.

>There was no fetch protection for all that real storage,

Security by obscurity was never a good idea.

>One day, one of those undergrads who we would today call a script 
>kiddy, ran an IEHPROGM SCRATCH VTOC on all the packs whose names 
>he could figure out. 

That tells me more about the staff than about MVT. It wouldn't have caused
any damage at my shop, even on the PCP systems.

>Do you remember TCAM...?

ITYM QTAM. Thanks for the memories :-(

>CRJE...?

CRBE. ITF.

>HASP-II

You think MFT 2 and HASP II were bad? The original MFT and HASP were
worse.

>It is indeed fun to play with on an emulator in 2010, but to say it
>wasn't broken...

Oh, it was seriously broken, but to blame lax administration on MVT is
worse than claiming that MVT wasn't broken.

-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to