p...@voltage.com (Phil Smith) writes:
> Long ago and far away, a friend was looking at the VSE microfiche and
> found an undocumented SVC that stored the top half of a register value
> in the address contained in the bottom half of the register. He
> promptly wrote a program that used that SVC to gain control of the
> system. (He was working at IBM, so this was an internal thing.)

re:
http://www.garlic.com/~lynn/2010n.html#73 Mainframe hacking?
http://www.garlic.com/~lynn/2010n.html#76 Mainframe hacking?

at the end of last century there is infamous case of large financial
institution (with large number of ATM machines) outsourcing the Y2K
remediation of their backend financial transaction processing system to
a software company ... which they found out much later was a front for a
criminal organization (eventually tripping across some very peculiar
pieces of code that would do some stealthy transactions, that could be
triggered by very specific combination of entries from ATM machine).

oh, and pieces of relative recent linkedin mainframe discussion
http://www.garlic.com/~lynn/2010l.html#28 Mainframe Hacking -- Fact or Fiction
http://www.garlic.com/~lynn/2010l.html#37 Mainframe Hacking -- Fact or Fiction
http://www.garlic.com/~lynn/2010l.html#51 Mainframe Hacking -- Fact or Fiction
http://www.garlic.com/~lynn/2010l.html#55 Mainframe Hacking -- Fact or Fiction

-- 
virtualization experience starting Jan1968, online at home since Mar1970

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to