To all who have been complaining that misusing the abbreviation USS is perfectly justified
USS is ambiguous as here amply demonstrated - even when the context is not the Communications Server TN3270 Server. Thus, ladies and gentlemen of the list, please do us all the favour of referring to UNIX System Services as UNIX System Services just as the UNIX System Services manuals do and poor list subscribers need never be confused by your misuse ever again! And, you'll note, the correct use deceived two erudite contributors who also just assumed the misuse until wiser counsel intervened. In case the revised title is puzzling, one of the complainants who considers it fashionable to dismiss insisting that USS should not be misused recently went out of his way to say that he was misusing USS and accused those who insist that it is misused as "anal". See a post in the thread "IBM error messages getting worse?" last Wednesday. - Howard The USS to which Mary Anne is referring is the original true USS, namely VTAM's Unformatted System Services, *not* the usurping UNIX System Services which principally the anti-SNA bigots have delighted in abbreviating as USS. In the past the protests about my pointing this out became so extensive that, in order not to cause too much outrage in the list, I vowed only to point out the possible ambiguity in the case where 3270 TELNET was the topic under discussion. This actually came up very recently and so I gingerly poked my head above the ramparts in order quietly to mention the matter at the end of a substantial post. Until now, I was trembling in anticipation of some verbal missiles to pipe down already - still waiting for more references to anality when the bigot involved had managed to calm himself sufficiently to go into print - just in case he was actually following the relevant thread. It seems I should have been and be somewhat bolder in denouncing the misuse of USS. So - having got that out of my system - the point Mary Anne was making is that the hacker managed to connect into the SNA network - probably by means of 3270 TELNET or just possibly by getting in via DLSw[1]. At that point the terminal or emulated terminal, most probably a 3270 display, shows Unformatted System Services (USS) message 10. USS message 10 probably presents a hint of the available applications which can be accessed simply by keying in the mentioned names. All the hacker has to do is to try to access the presented applications. Ideally, the application would have a sign-on but that's up to the systems programmer who set up the application. It seems the CICS system in question did not have such protection. Incidentally, what would a UNIX System Services "screen" be? You can see from the above that an USS "screen" is easily understood to be a VTAM Unformatted System Services message 10 - so perhaps it wasn't all that ambiguous in this case - but misuse of USS is still a trap for the unwary! - Chris Mason On Mon, 20 Jul 2009 05:36:28 -0700, Howard Rifkind <[email protected]> wrote: >Interesting, I didn't think that back in '93 MVS 4.3 had a USS piece. > >Or was it OS390 R1 or something like that. > >--- On Sun, 7/19/09, Mary Anne Matyaz <[email protected]> wrote: > >> From: Mary Anne Matyaz <[email protected]> >> Subject: Re: Mainframe hacking >> To: [email protected] >> Date: Sunday, July 19, 2009, 10:07 PM >> I had one once, circa 1992-1993. It >> was at a university, which at the time >> were notoriously open, at least as far as TCPIP and a >> firewall. Someone got >> the uss screen, was able to get into the production CICS, >> and the CECI >> command was not protected, so they were able to shut the >> CICS down. The hack >> came from Brazil somewhere. Bank of Brazil maybe? >> >> Mary Anne >> >> On Sun, Jul 19, 2009 at 5:47 PM, P S <[email protected]> >> wrote: >> >> > Does anyone here recall any published news articles or >> incidents >> > involving mainframe hacking (any flavor of VM, VSE or >> MVS)? Do you >> > personally know of any incidents? >> > >> > Or have any such been kept on the QT? ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

