In <[EMAIL PROTECTED]>, on 08/19/2006
at 08:28 PM, john gilmore <[EMAIL PROTECTED]> said:
>I have not exploited these weaknesses for fun or profit,
I have, but that was before MODESET provided a cleaner and supported
way to get into key zero. I've also APARed those weaknesses that I
discovered.
05F0
0A0C
>but I cannot as a practical matter spend time writing up a PMR every
> time I identify a possible security flaw.
Why? How often do ou encounter them? Once a decade? Less?
>That is not my job.
Are you responsible for keeping your system up? Isn't it your job to
correct a problem capable of taking your system down?
>'Decent obscurity' makes some things unavailable, or at least very
>much more difficult of access, to the unlearned; and this is
>useful.
You're playing Russian Roulette with your system.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html