Beta test announcement - SyzAUTO/z Version 6

2012-06-08 Thread Brian Westerman
Hi, I wanted to let everyone on the list know that the Beta testing phase for SyzAUTO/z V6 is going to be starting on June 15. This time, the beta testing is not limited to just existing clients, we are asking for up to 150 non-client sites on a first-come basis. All beta test sites that

DFHSM Secondary Space Management

2012-06-08 Thread Phil Kingston
All, I have a management class that is supposed to delete selected datasets after 30days non usage. The datasets end up on either ML1 or ML2. It appears though that HSM secondary space management is not deleteing these and were getting a build up of datasets which should have been deleted. The

Controlling the FTP server - FTCHKPWD

2012-06-08 Thread Jake anderson
Dear List, Good Day !! To control the FTP server we know we can use FTCHKPWD user exit. Has anyone used this EXIT at your shop to control the FTP access ? Just wanted to understand the method to install this exit and control only the specified user gaining access to FTP server running on Z/OS.

Re: DFHSM Secondary Space Management

2012-06-08 Thread Gonzalo Cengotita
Phil, I suppose by the context you kown the problem is a lack of backup because you have seen in the log an error something like dataset not deleted because it has no backup and that's why you mention that the backup is not done, isn't it?. If so we need to know why the backup was not made. Some

Re: ENF Listener usage

2012-06-08 Thread Rob Scott
The possibility of consuming extra CSA is much less desirable that a few extra instructions inside a neutered ENF listener routine. I would probably choose option (2) Rob Scott Lead Developer Rocket Software 77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA Tel: +1.781.684.2305

How many cost a cpu second?

2012-06-08 Thread Salva Carrasco
Well, I know the simple way is: TCO/nCPU/365/24/3600 But, i do not have the TCO. So, i would like to get an average. I know that there is a lot of factor in the play: - LPAR vs single image - MSU, MIPs, etc.. - Software licences - ELAs - Hardware amortization - etc... So, anybody can make a

Re: DFHSM Secondary Space Management

2012-06-08 Thread Phil Kingston
Gonzalo, I know the datasets are not backed up. That was my first thought when i noticed they were not being deleted. They dont need to be backed up. From reading the manual, secondary space management starts by reading in the management class definitions, then applies the definitions to it's

Re: How many cost a cpu second?

2012-06-08 Thread R.S.
W dniu 2012-06-08 13:32, Salva Carrasco pisze: Well, I know the simple way is: TCO/nCPU/365/24/3600 But, i do not have the TCO. So, i would like to get an average. I know that there is a lot of factor in the play: - LPAR vs single image - MSU, MIPs, etc.. - Software licences - ELAs -

Re: Controlling the FTP server - FTCHKPWD

2012-06-08 Thread Steven St.Jean
Jake, I do not use FTCHKPWD, but I use FTCHKCMD to control user access (and lots of other things). I preferred FTCHKCMD, because I found I could accomplish everything that FTCHKPWD allowed me to do and more, and it shares a scratchpad with FTPOSTPR. The server exits are pretty easy to install

Re: DFHSM Secondary Space Management

2012-06-08 Thread Staller, Allan
Verify the actually assigned management class for the datasets in question. It may not be the one you think it is. Actually, IIRC, by default, the dataset cannot be deleted from ML2 if there is no backup. There is a patch available in the DFHSM Implementation/Customization Guide to change this

Re: SR

2012-06-08 Thread Chip Grantham
As with their 56 hour outage, we were told by my IBM rep (to whom I complained) to use the phone number. I think I can get more done with the phone call. I'm ready to dump the SR. Chip G. From: Barbara Nitz nitz-...@gmx.net To: IBM-MAIN@bama.ua.edu Date: 06/07/2012 11:46 PM

Re: SR

2012-06-08 Thread mvs1sp
I have found it to be very unfriendly. I wish IBM would have incorporated the good features of ETR.  I have not gotten emails when the record is updated ( my profile requests such), so I have to logon (twice) just to check - this is a time waster to me. I opened a SR to the SR Help Desk, but I

Re: SR

2012-06-08 Thread Tom Ambros
I'm not feeling the hate, except for the one item just mentioned. The second sign on amounts to 9 keystrokes, one click and one enter - first character of userid, accept Chrome's prompt, enter password and hit enter. Once a day? No big deal. Leave the browser window open. Being able to

Re: FYI LinKEdln passwords hacked

2012-06-08 Thread Gord Tomlin
On 2012-06-07 07:35, R.S. wrote: W dniu 2012-06-06 23:31, Ed Gould pisze: LinkedIn Users: Change Password Now Attackers appear to have obtained--and may have already decrypted--at least 6.5 million LinkedIn passwords. How is it related to IBM mainframes? Hint: Maybe some mainframers do use

Re: SR

2012-06-08 Thread Rob Scott
The component choice, however, is utterly baffling. How that got into production is a complete mystery. No matter how I try I can not find a valid choice for Comm Server, for example. Agree completely - this very thing had me and a couple of our sysprogs scratching our heads for a

Re: FYI LinKEdln passwords hacked

2012-06-08 Thread Charles Mills
Amen! Charles -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Gord Tomlin Sent: Friday, June 08, 2012 8:24 AM To: IBM-MAIN@bama.ua.edu Subject: Re: FYI LinKEdln passwords hacked On 2012-06-07 07:35, R.S. wrote: W dniu 2012-06-06 23:31,

Re: Controlling the FTP server - FTCHKPWD

2012-06-08 Thread Kirk Wolf
Steven is an expert in this area, but there is also some good information in the IBM document: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/FRAMESET/F1A1B391/2.3.4.1?SHELF=F1A1BKB1DT=20100121150057 See Steps

Re: Dumps to vendors with sensitive data

2012-06-08 Thread Andy White
Walt and others I wonder we are the provider of a product which we contain what is the Tricare data. What I am wondering since we are not a military installation etc would we need this type of separation. We called our big vendors and so far they are looking within for answers/solutions. I

Re: Dumps to vendors with sensitive data

2012-06-08 Thread Walt Farrell
On Fri, 8 Jun 2012 13:58:16 -0400, Andy White awh...@metlife.com wrote: Walt and others I wonder we are the provider of a product which we contain what is the Tricare data. What I am wondering since we are not a military installation etc would we need this type of separation. We called our big

Re: Dumps to vendors with sensitive data

2012-06-08 Thread Sevetson, Phil
Walt, you'd definitely need to see that HIPAA-protected data didn't leave your company except under NDA (Non-Disclosure Agreement), or really even be seen by anyone without a strong need to know and a signed NDA. --Phil, former Health Insurance Company DBA -Original Message- From: IBM

Re: Need a PC tape drive to read 3490, 3490E

2012-06-08 Thread Mike Baldwin
Hi Sam, If you're looking for free, or close to it, maybe the Hercules group suggestion is best. I know something about connecting 3490, 3590, and 9840 drives to Windows PC's, because we have a software product called TelTape for Windows. But we have only one such 3490 drive, and need it to

Re: ENF Listener usage

2012-06-08 Thread Jim Mulder
We have a long-running Started Task that controls the use of an ENF listener for SMF interval record collection with an operator command. The ENF listener requires use of CSA storage. When the Started Task receives an operator command to start SMF interval processing it allocates CSA

Re: FYI LinkedIn passwords hacked

2012-06-08 Thread Clark Morris
On 7 Jun 2012 14:28:43 -0700, in bit.listserv.ibm-main you wrote: On Thu, 7 Jun 2012 19:55:51 +0200, R.S. r.skoru...@bremultibank.com.pl wrote: Having password or not is not matter of topic of IBM-MAIN. There are really a lot of things which do have passwords and are absolutely unrelated to

Re: Dumps to vendors with sensitive data

2012-06-08 Thread Linda Mooney
Hi Andy,   It has been 3-4 years since the last time, and it was sniffer logs, dumps, and traces - full end to end to resolve a critical remote printer issue for law enforcement.  We redacted what could be redacted - Ip addresses were replaced with literals, e.g. C-IP-addr1, for customer IP

Personal password policy was Re: FYI LinKEdln passwords hacked

2012-06-08 Thread Clark Morris
On 7 Jun 2012 19:15:21 -0700, in bit.listserv.ibm-main you wrote: On 6/6/2012 5:38 PM, Ed Gould wrote: LinkedIn Users: Change Password Now Attackers appear to have obtained--and may have already decrypted--at least 6.5 million LinkedIn passwords.

Re: FYI LinkedIn passwords hacked

2012-06-08 Thread Phil Smith
Clark Morris wrote: Would you mind explaining further what unsalted passwords are? It's not unsalted passwords, it's unsalted hashes. The salt means added entropy (randomness). For example, when the password for clark.mor...@company.commailto:clark.mor...@company.com is hashed, you might add

Re: FYI LinkedIn passwords hacked

2012-06-08 Thread Bill Fairchild
When in doubt, try Google. I just did, and quickly discovered that surfing for salted is much more productive than surfing for unsalted. Start with this one: http://en.wikipedia.org/wiki/Salt_(cryptography) Bill Fairchild Programmer Rocket Software 408 Chamberlain Park Lane * Franklin, TN

Re: FYI LinkedIn passwords hacked

2012-06-08 Thread R.S.
W dniu 2012-06-08 22:02, Clark Morris pisze: On 7 Jun 2012 14:28:43 -0700, in bit.listserv.ibm-main you wrote: [...] Yet some smug mainframe workers could learn something from this. Such as, storing hashed but unsalted passwords is not such a good idea (and, yes, I have seen that done on a

Re: Need a PC tape drive to read 3490, 3490E

2012-06-08 Thread R.S.
W dniu 2012-06-08 21:06, Mike Baldwin pisze: [...] There are also Fujitsu, IBM 3490F (which I think is really Overland), If you mean 3490E-Fxx, then yes, it;s Overland drive, attached (using SCSI) to a PC. The PC is small Siemens server running Sinix (Siemens flavor of Unix). The PC has ESCON

Failed Disk Data Exposure

2012-06-08 Thread Grinsell, Don
Here's a Friday topic: With modern disk arrays, e.g. DS8000, what is the real exposure of meaningful residual data being recovered from a single drive out of the array. I can't seem to find anything definitive other than a lot of data may be recoverable statements from vendors selling secure

Re: Failed Disk Data Exposure

2012-06-08 Thread McKown, John
If it were a single drive in a Raid 5 type configuration, I'd guess it would be totally impossible. But in a Raid 1 (mirrored), why not? Each drive contains the entire set of bits. But I don't know that for sure. It's just a SWAG. -- John McKown Systems Engineer IV IT Administrative Services

Re: Failed Disk Data Exposure

2012-06-08 Thread zMan
On Fri, Jun 8, 2012 at 5:20 PM, McKown, John john.mck...@healthmarkets.comwrote: If it were a single drive in a Raid 5 type configuration, I'd guess it would be totally impossible. But in a Raid 1 (mirrored), why not? Each drive contains the entire set of bits. But I don't know that for sure.

Re: Failed Disk Data Exposure

2012-06-08 Thread Tony Harminc
On 8 June 2012 17:37, zMan zedgarhoo...@gmail.com wrote: On Fri, Jun 8, 2012 at 5:20 PM, McKown, John john.mck...@healthmarkets.comwrote: If it were a single drive in a Raid 5 type configuration, I'd guess it would be totally impossible. But in a Raid 1 (mirrored), why not? Each drive

Re: Need a PC tape drive to read 3490, 3490E

2012-06-08 Thread Mike Baldwin
Hello R.S., There are also Fujitsu, IBM 3490F (which I think is really Overland), If you mean 3490E-Fxx, then yes, it;s Overland drive, attached (using SCSI) to a PC. The PC is small Siemens server running Sinix (Siemens flavor of Unix). The PC has ESCON cards for host attachment and SCSI for

Re: Controlling the FTP server - FTCHKPWD

2012-06-08 Thread Jake anderson
You might also consider using a port of entry (the TERMINAL CLASS), to restrict access by IP address. I could see examples on CICS but any syntax which secures the port 21 alone ? Jake On Fri, Jun 8, 2012 at 10:48 PM, Kirk Wolf k...@dovetail.com wrote: Steven is an expert in this area, but

Re: Failed Disk Data Exposure

2012-06-08 Thread zMan
On Fri, Jun 8, 2012 at 6:27 PM, Tony Harminc t...@harminc.net wrote: I was asked a couple of years ago to help recover some data from a failed system -- failed as in unnoticed single drive failure followed by second drive failure and discovery that backups had not been performed correctly.