R.S. wrote:

>W dniu 2012-03-28 23:39, Paul Gilmartin pisze:
>> On Wed, 28 Mar 2012 23:13:58 +0200, R.S. wrote:
>>> The problem is we don't believe. :-)
>> It's easy.  Bribe the sysadmin.  (FSVO "access".)
>That's what I always mention. Bribe or blackmail. The last one is much more 
>efficient IMHO, but both used to work.

Hmmmm, what did I said about *insiders*? ;-D

{ Side Note FYI: There is a thread now running on RACF-L about how long you 
should keep security logs. }

Thanks Ray Overby for your kind reply! This is what I suspected anyways. Those 
'penetration teams' need to have bread and butter on the table... :-D

Groete / Greetings
Elardus Engelbrecht

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

Reply via email to