At 10/14/2010 12:24 PM, Chris Craddock wrote:
(as Bob knows) it is impossible to create/install a malicious FLIH
or SVC or PC without already having the keys to the kingdom anyway.
That is the foundation of integrity and the reason why the
installation has to appropriately protect system datasets and APF libraries.
Well that's just the problem, Chris, isn't it... The keys to the
kingdom really are not well guarded. That's what my 2006 post was all about.
Dave Cole REPLY TO: dbc...@colesoft.com
ColeSoft Marketing WEB PAGE: http://www.colesoft.com
736 Fox Hollow Road VOICE: 540-456-8536
Afton, VA 22920 FAX: 540-456-6658
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html