In <[EMAIL PROTECTED]>, on 06/19/2005
   at 07:20 PM, Gil Peleg <[EMAIL PROTECTED]> said:

>On the other hand, anyone who worked at the same shop for a long time
>knows  how to "trick" its systems. How to run jobs with any jobclass
>(and maybe  form some kind of a denial of service attack?), how
>passwords are managed,  who are the powerful users, what resources
>are not properly protected, how  to falsify identities under
>CICS/IMS, how to run batch jobs under other  users, how to become
>APF-authorized, how to utilize error in 3rd party  products, and the
>list goes on... Every shop and every experienced system  programmer
>(some times not even a system programmer, but an experienced 
>programmer) has their tricks.

I've seen shops that were that sloppy, but not all are.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to