--- On Fri, 6/26/09, Edward Jaffe <[email protected]> wrote:

> From: Edward Jaffe <[email protected]>
> Subject: Re: IBM Software Secure Support via USA Citizens
> To: [email protected]
> Date: Friday, June 26, 2009, 10:43 AM
> Ed Gould wrote:
> > I had a job interview about 20 years ago at a place in
> California that handled top secret (and above data) all the
> time. I asked how they contacted IBM for support and how
> they handled dumps problems etc...The answer I got back was
> that they didn't contact IBM and you were expected to figure
> out the issue. I was at that time of the interview pretty
> sure I was not interested in it so I asked but without
> source how can you expect to figure out where the problem
> was and even if you could how could you fix it without
> telling IBM how to fix it. The answer was surprising 
> even to me. They said you don't.
> > I shook my head and walked out and drove back to the
> airport and took the plane back and was so disgusted with
> myself for wasting my time on an interview that if I had
> been given an outline of all the restrictions that would be
> put on the job I would not have wasted my time.
> >   
> 
> I have received dumps from top secret government
> organizations (both domestic and foreign) that have been
> programmatically redacted. The dumps were pre-formatted by
> the customer (the output of various IPCS commands against
> the original dump file). All names of things (userid,
> system, sysplex, NJE node, JES member, etc.) in the dump
> were replaced with the characters XXXX in both hex and
> EBCDIC portions of each line. Amazingly, I have been able to
> solve problems using such dumps!
> 


Ed:

Interesting thanks for the information. I am wondering how you handle stand 
alone dumps? 

I am not sure how anyone (thing?) could handle something like that or in a few 
cases GTF Trace . Both items would require a LOT of human checks,
of course there is always the issue of a vendor needing to see X and X is a top 
secret "information". The vendor can just say well I cannot help the user as he 
refused (not a good word) to give ne the information I need to resolve the 
issue.

I am suggesting that certain aspects of a dump or (anything else for that 
matter) would be indecipherable to most people (even a cryptologist ) but to a 
person with a background in IBM dumps would be pretty much understandable. 

Can you see a program written to process standalone dumps "tapes" that could 
make any sort of close guess to what fields are let alone bits in control 
blocks? I am pretty sure I cannot.  Any program written probably would be on 
IBM's list of "must get" products.

Ed 




      

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to