Gil, Not sure about the "church lady" reference. Ye old brain is a bit dull today.
As I remember the hacking was done and presented by an IBMer. I couldn't agree more about the security by obscurity. But in a certain sense, isn't that was encryption is? <VBG> But I don't think security is hard.. but it does take time, effort and consistency... very Demming in a lot of ways. Rob Schramm Rob Schramm Senior Systems Consultant Imperium Group On Sun, Jun 30, 2013 at 10:57 PM, Paul Gilmartin <[email protected]>wrote: > On Sun, 30 Jun 2013 17:33:52 -0400, Rob Schramm wrote: > > >If you are feeling the need for extra paranoia, Ray Overby's tool to probe > >all the services that might allow the MVS equivalent of "super user". For > >data... PCI .. Xbridge for analyzing all data on the system for > compliance. > > > Could it be ... SATAN? > > >Seems that there is a RACF hacking guide for subverting a security DB. > >Numerous conversations about sysprog LPARS. > > > Adversarial or friendly? > > I don't believe in Security by Obscurity. > > -- gil > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
