In <[EMAIL PROTECTED]>, on 06/19/2005
at 07:20 PM, Gil Peleg <[EMAIL PROTECTED]> said:
>On the other hand, anyone who worked at the same shop for a long time
>knows how to "trick" its systems. How to run jobs with any jobclass
>(and maybe form some kind of a denial of service attack?), how
>passwords are managed, who are the powerful users, what resources
>are not properly protected, how to falsify identities under
>CICS/IMS, how to run batch jobs under other users, how to become
>APF-authorized, how to utilize error in 3rd party products, and the
>list goes on... Every shop and every experienced system programmer
>(some times not even a system programmer, but an experienced
>programmer) has their tricks.
I've seen shops that were that sloppy, but not all are.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html