Gil,

Not sure about the "church lady" reference.  Ye old brain is a bit dull
today.

As I remember the hacking was done and presented by an IBMer.

I couldn't agree more about the security by obscurity.  But in a certain
sense, isn't that was encryption is? <VBG>

But I don't think security is hard.. but it does take time, effort and
consistency... very Demming in a lot of ways.

Rob Schramm


Rob Schramm
Senior Systems Consultant
Imperium Group



On Sun, Jun 30, 2013 at 10:57 PM, Paul Gilmartin <[email protected]>wrote:

> On Sun, 30 Jun 2013 17:33:52 -0400, Rob Schramm wrote:
>
> >If you are feeling the need for extra paranoia, Ray Overby's tool to probe
> >all the services that might allow the MVS equivalent of "super user".  For
> >data... PCI .. Xbridge for analyzing all data on the system for
> compliance.
> >
> Could it be ... SATAN?
>
> >Seems that there is a RACF hacking guide for subverting a security DB.
> >Numerous conversations about sysprog LPARS.
> >
> Adversarial or friendly?
>
> I don't believe in Security by Obscurity.
>
> -- gil
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to