p...@voltage.com (Phil Smith) writes: > Long ago and far away, a friend was looking at the VSE microfiche and > found an undocumented SVC that stored the top half of a register value > in the address contained in the bottom half of the register. He > promptly wrote a program that used that SVC to gain control of the > system. (He was working at IBM, so this was an internal thing.)
re: http://www.garlic.com/~lynn/2010n.html#73 Mainframe hacking? http://www.garlic.com/~lynn/2010n.html#76 Mainframe hacking? at the end of last century there is infamous case of large financial institution (with large number of ATM machines) outsourcing the Y2K remediation of their backend financial transaction processing system to a software company ... which they found out much later was a front for a criminal organization (eventually tripping across some very peculiar pieces of code that would do some stealthy transactions, that could be triggered by very specific combination of entries from ATM machine). oh, and pieces of relative recent linkedin mainframe discussion http://www.garlic.com/~lynn/2010l.html#28 Mainframe Hacking -- Fact or Fiction http://www.garlic.com/~lynn/2010l.html#37 Mainframe Hacking -- Fact or Fiction http://www.garlic.com/~lynn/2010l.html#51 Mainframe Hacking -- Fact or Fiction http://www.garlic.com/~lynn/2010l.html#55 Mainframe Hacking -- Fact or Fiction -- virtualization experience starting Jan1968, online at home since Mar1970 ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html