---------------------------<snip>---------------------------
From one hand people say security by obscurity is no security. From the other hand, it is easier to find some hole, when you know details about the system.
--------------------------<unsnip>---------------------------
Most of us here on the list could probably develop a fairly accurate picture of the configuration just from the information that's in storage, so "security by obscurity" is a fairly nebulous concept at best. On the other hand, knowing about the configuration does NOT automatically confer the ability to interfere with it. Any shop that's even moderately secure will have APF-authorized libraries secured from unauthorized updates, preventing the hacker from implanting his goodies. Knowing what datasets are authorized doesn't allow me to update them with my code. QED ??


Regards

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to