On 6 Jun 2010 13:19:57 -0700, in bit.listserv.ibm-main you wrote:

>On Sun, 6 Jun 2010 14:29:32 -0400, William Donzelli wrote:
>
>>> In one sense, we need to be careful about what we ask for.  Do we want
>>> z/OS to be easily available to those who want to find vulnerabilities
>>> and crack the system?
>>
>This is admitting defeat; acknowledging that z/OS is so riddled
>with defects, some irreparable, that the best we can hope for
>is that no one finds out.

One of the sources of vulnerability of any operating system is have a
computer that can be dedicated to breaking that systems.  Some of the
mods that have been applied from various public domain sources may
have created vulnerabilities.  We know that in the past various third
party software has put holes into the system through magic SVCs and/or
other less than good practices.  The hole in SMP/E that is being
covered might be fun to play with on a dedicated system with no
oversight.  Of course criminal enterprises looking to make decent
money on finding holes for profit may already have a z machine
purchased or leased with the software through legitimate or less than
legitimate channels.

Clark Morris    
>
>This brings to mind a thread that went through here a couple
>months ago.
>
>-- gil
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to