In <[EMAIL PROTECTED]>, on 08/19/2006
   at 08:28 PM, john gilmore <[EMAIL PROTECTED]> said:

>I have not exploited these weaknesses for fun or profit,

I have, but that was before MODESET provided a cleaner and supported
way to get into key zero. I've also APARed those weaknesses that I
discovered.

         05F0
         0A0C

>but I cannot as a practical matter spend time writing up a PMR every
> time I identify a possible security flaw.

Why? How often do ou encounter them? Once a decade? Less?

>That is not my job.

Are you responsible for keeping your system up? Isn't it your job to
correct a problem capable of taking your system down?

>'Decent obscurity' makes some things unavailable, or at least very
>much more difficult of access, to the unlearned; and this is
>useful.

You're playing Russian Roulette with your system.

-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to