--------------------------<snip>--------------------

There is no easy way to counter such a "one and done" approach - unless you either improve your database's physical security (don't let it get into the wrong hands) or also require the cracker to physically possess something presumably uniquely identifiable. (Like a physical key but usually electronic.) It isn't so much that good guys are getting harder to find as it is that bad guys are getting a little bit sneakier.
------------------------<unsnip>--------------------
Securing the RACF DB and all its backups will go a LOOOOONG way toward blocking these bad guys. Amazing how many shops don't take those simple steps.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to