R.S. wrote: >W dniu 2012-03-28 23:39, Paul Gilmartin pisze: >> On Wed, 28 Mar 2012 23:13:58 +0200, R.S. wrote: >>> The problem is we don't believe. :-) >> It's easy. Bribe the sysadmin. (FSVO "access".) >That's what I always mention. Bribe or blackmail. The last one is much more >efficient IMHO, but both used to work.
Hmmmm, what did I said about *insiders*? ;-D { Side Note FYI: There is a thread now running on RACF-L about how long you should keep security logs. } Thanks Ray Overby for your kind reply! This is what I suspected anyways. Those 'penetration teams' need to have bread and butter on the table... :-D Groete / Greetings Elardus Engelbrecht ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN