--------------------------<snip>--------------------
There is no easy way to counter such a "one and done" approach - unless you
either improve your database's physical security (don't let it get into the
wrong hands) or also require the cracker to physically possess something
presumably uniquely identifiable. (Like a physical key but usually electronic.)
It isn't so much that good guys are getting harder to find as it is that bad
guys are getting a little bit sneakier.
------------------------<unsnip>--------------------
Securing the RACF DB and all its backups will go a LOOOOONG way toward
blocking these bad guys. Amazing how many shops don't take those simple
steps.
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html