Hi,
I wanted to let everyone on the list know that the Beta testing phase for
SyzAUTO/z V6 is going to be starting on June 15. This time, the beta testing
is not limited to just existing clients, we are asking for up to 150 non-client
sites on a first-come basis. All beta test sites that
All,
I have a management class that is supposed to delete selected datasets after
30days non usage. The datasets end up on either ML1 or ML2. It appears though
that HSM secondary space management is not deleteing these and were getting a
build up of datasets which should have been deleted. The
Dear List,
Good Day !!
To control the FTP server we know we can use FTCHKPWD user exit. Has anyone
used this EXIT at your shop to control the FTP access ? Just wanted to
understand the method to install this exit and control only the specified
user gaining access to FTP server running on Z/OS.
Phil,
I suppose by the context you kown the problem is a lack of backup because
you have seen in the log an error something like dataset not deleted
because it has no backup and that's why you mention that the backup is not
done, isn't it?.
If so we need to know why the backup was not made. Some
The possibility of consuming extra CSA is much less desirable that a few extra
instructions inside a neutered ENF listener routine.
I would probably choose option (2)
Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Well, I know the simple way is:
TCO/nCPU/365/24/3600
But, i do not have the TCO. So, i would like to get an average. I know that
there is a lot of factor in the play:
- LPAR vs single image
- MSU, MIPs, etc..
- Software licences
- ELAs
- Hardware amortization
- etc...
So, anybody can make a
Gonzalo,
I know the datasets are not backed up. That was my first thought when i noticed
they were not being deleted. They dont need to be backed up.
From reading the manual, secondary space management starts by reading in the
management class definitions, then applies the definitions to it's
W dniu 2012-06-08 13:32, Salva Carrasco pisze:
Well, I know the simple way is:
TCO/nCPU/365/24/3600
But, i do not have the TCO. So, i would like to get an average. I know that
there is a lot of factor in the play:
- LPAR vs single image
- MSU, MIPs, etc..
- Software licences
- ELAs
-
Jake,
I do not use FTCHKPWD, but I use FTCHKCMD to control user access (and lots
of other things). I preferred FTCHKCMD, because I found I could accomplish
everything that FTCHKPWD allowed me to do and more, and it shares a
scratchpad with FTPOSTPR.
The server exits are pretty easy to install
Verify the actually assigned management class for the datasets in
question. It may not be the one you think it is.
Actually, IIRC, by default, the dataset cannot be deleted from ML2 if
there is no backup.
There is a patch available in the DFHSM Implementation/Customization
Guide to change this
As with their 56 hour outage, we were told by my IBM rep (to whom I
complained) to use the phone number. I think I can get more done with the
phone call. I'm ready to dump the SR.
Chip G.
From: Barbara Nitz nitz-...@gmx.net
To: IBM-MAIN@bama.ua.edu
Date: 06/07/2012 11:46 PM
I have found it to be very unfriendly. I wish IBM would have incorporated the
good features of ETR. I have not gotten emails when the record is updated ( my
profile requests such), so I have to logon (twice) just to check - this is a
time waster to me. I opened a SR to the SR Help Desk, but I
I'm not feeling the hate, except for the one item just mentioned.
The second sign on amounts to 9 keystrokes, one click and one enter -
first character of userid, accept Chrome's prompt, enter password and hit
enter. Once a day? No big deal. Leave the browser window open.
Being able to
On 2012-06-07 07:35, R.S. wrote:
W dniu 2012-06-06 23:31, Ed Gould pisze:
LinkedIn Users: Change Password Now
Attackers appear to have obtained--and may have already decrypted--at
least 6.5 million LinkedIn passwords.
How is it related to IBM mainframes?
Hint: Maybe some mainframers do use
The component choice, however, is utterly baffling. How that got into
production is a complete mystery. No matter how I try I can not find a
valid choice for Comm Server, for example.
Agree completely - this very thing had me and a couple of our sysprogs
scratching our heads for a
Amen!
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
Of Gord Tomlin
Sent: Friday, June 08, 2012 8:24 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: FYI LinKEdln passwords hacked
On 2012-06-07 07:35, R.S. wrote:
W dniu 2012-06-06 23:31,
Steven is an expert in this area, but there is also some good information
in the IBM document:
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/FRAMESET/F1A1B391/2.3.4.1?SHELF=F1A1BKB1DT=20100121150057
See Steps
Walt and others I wonder we are the provider of a product which we contain
what is the Tricare data. What I am wondering since we are not a military
installation etc would we need this type of separation. We called our big
vendors and so far they are looking within for answers/solutions. I
On Fri, 8 Jun 2012 13:58:16 -0400, Andy White awh...@metlife.com wrote:
Walt and others I wonder we are the provider of a product which we contain
what is the Tricare data. What I am wondering since we are not a military
installation etc would we need this type of separation. We called our big
Walt, you'd definitely need to see that HIPAA-protected data didn't leave your
company except under NDA (Non-Disclosure Agreement), or really even be seen by
anyone without a strong need to know and a signed NDA.
--Phil, former Health Insurance Company DBA
-Original Message-
From: IBM
Hi Sam,
If you're looking for free, or close to it, maybe the Hercules group suggestion
is best.
I know something about connecting 3490, 3590, and 9840 drives to Windows PC's,
because we have a software product called TelTape for Windows.
But we have only one such 3490 drive, and need it to
We have a long-running Started Task that controls the use of an ENF
listener for SMF interval record collection with an operator
command. The ENF listener requires use of CSA storage.
When the Started Task receives an operator command to start SMF
interval processing it allocates CSA
On 7 Jun 2012 14:28:43 -0700, in bit.listserv.ibm-main you wrote:
On Thu, 7 Jun 2012 19:55:51 +0200, R.S. r.skoru...@bremultibank.com.pl wrote:
Having password or not is not matter of topic of IBM-MAIN.
There are really a lot of things which do have passwords and are
absolutely unrelated to
Hi Andy,
It has been 3-4 years since the last time, and it was sniffer logs, dumps, and
traces - full end to end to resolve a critical remote printer issue for law
enforcement. We redacted what could be redacted - Ip addresses were replaced
with literals, e.g. C-IP-addr1, for customer IP
On 7 Jun 2012 19:15:21 -0700, in bit.listserv.ibm-main you wrote:
On 6/6/2012 5:38 PM, Ed Gould wrote:
LinkedIn Users: Change Password Now
Attackers appear to have obtained--and may have already decrypted--at
least 6.5 million LinkedIn passwords.
Clark Morris wrote:
Would you mind explaining further what unsalted passwords are?
It's not unsalted passwords, it's unsalted hashes. The salt means added
entropy (randomness). For example, when the password for
clark.mor...@company.commailto:clark.mor...@company.com is hashed, you might
add
When in doubt, try Google. I just did, and quickly discovered that surfing for
salted is much more productive than surfing for unsalted. Start with this
one:
http://en.wikipedia.org/wiki/Salt_(cryptography)
Bill Fairchild
Programmer
Rocket Software
408 Chamberlain Park Lane * Franklin, TN
W dniu 2012-06-08 22:02, Clark Morris pisze:
On 7 Jun 2012 14:28:43 -0700, in bit.listserv.ibm-main you wrote:
[...]
Yet some smug mainframe workers could learn something from this. Such as,
storing hashed but unsalted passwords is not such a good idea (and, yes, I have
seen that done on a
W dniu 2012-06-08 21:06, Mike Baldwin pisze:
[...]
There are also Fujitsu, IBM 3490F (which I think is really Overland),
If you mean 3490E-Fxx, then yes, it;s Overland drive, attached (using
SCSI) to a PC. The PC is small Siemens server running Sinix (Siemens
flavor of Unix). The PC has ESCON
Here's a Friday topic: With modern disk arrays, e.g. DS8000, what is the real
exposure of meaningful residual data being recovered from a single drive out of
the array. I can't seem to find anything definitive other than a lot of data
may be recoverable statements from vendors selling secure
If it were a single drive in a Raid 5 type configuration, I'd guess it would be
totally impossible. But in a Raid 1 (mirrored), why not? Each drive contains
the entire set of bits. But I don't know that for sure. It's just a SWAG.
--
John McKown
Systems Engineer IV
IT
Administrative Services
On Fri, Jun 8, 2012 at 5:20 PM, McKown, John
john.mck...@healthmarkets.comwrote:
If it were a single drive in a Raid 5 type configuration, I'd guess it
would be totally impossible. But in a Raid 1 (mirrored), why not? Each
drive contains the entire set of bits. But I don't know that for sure.
On 8 June 2012 17:37, zMan zedgarhoo...@gmail.com wrote:
On Fri, Jun 8, 2012 at 5:20 PM, McKown, John
john.mck...@healthmarkets.comwrote:
If it were a single drive in a Raid 5 type configuration, I'd guess it
would be totally impossible. But in a Raid 1 (mirrored), why not? Each
drive
Hello R.S.,
There are also Fujitsu, IBM 3490F (which I think is really Overland),
If you mean 3490E-Fxx, then yes, it;s Overland drive, attached (using
SCSI) to a PC. The PC is small Siemens server running Sinix (Siemens
flavor of Unix). The PC has ESCON cards for host attachment and SCSI for
You might also consider using a port of entry (the TERMINAL CLASS), to
restrict access by IP address.
I could see examples on CICS but any syntax which secures the port 21 alone
?
Jake
On Fri, Jun 8, 2012 at 10:48 PM, Kirk Wolf k...@dovetail.com wrote:
Steven is an expert in this area, but
On Fri, Jun 8, 2012 at 6:27 PM, Tony Harminc t...@harminc.net wrote:
I was asked a couple of years ago to help recover some data from a
failed system -- failed as in unnoticed single drive failure followed
by second drive failure and discovery that backups had not been
performed correctly.
36 matches
Mail list logo