rd3"
>.> "ext"
Surely this is what Thomas expected. I can't imagine what would
legitimately cause REXX to behave in any other way - and I don't understand
why anyone would expect anything different. Now I'm going to go read that
link someone posted that
I've never used the COMPARE command. (Never used MACRO_MSG, either.) What
message were you expecting from COMPARE?
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* By 2005 or so, it will be clear that the Internet's impact on the economy
has been no greater than the fax
even if some combination of moves make it possible, how is it possible to
do it "carelessly"?
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* Our cause is never more in danger than when a human, no longer desiring, but
still intending, to do our Enemy's will, looks r
desire to spend time and money
on fixing the problem. Also I should understand the method pretty
thoroughly myself, lest I be reduced under cross-examination to "gee, I
heard there was a way using a pin-wire flummox, but I'm not sure how that
works..."
---
Bob Bridges, robhbrid...
Ok, but the only way to submit a job via SYSOUT=(A,INTRDR) is to have TSO in
the first place, right? What I'm asking is how users might submit batch who
~don't~ have TSO.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* In an emergency, a drawstring from a parka hood c
e batch jobs also have TSO and/or a UID.
I don't know much about SSH or Telnet - hardly anything about them, in fact.
Is it worth asking for details?
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* Every now and then go away, have a little relaxation, for when you come
yone confirm? If I were a CICS user
without the ability to log on to TSO, could I still submit a batch job somehow?
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* You know you've had too much coffee when
Juan Valdez names his donkey after you.
You've w
st assumptions. But apparently not.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* Nearly all men can stand adversity. If you want to test a man's character,
give him power. -Abraham Lincoln */
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTS
so, a situation
most ardently to be avoided :). The lesson I take from this, and pass on to
my clients, is that read access to the security database is a huge exposure
and in most cases - that is, for most user IDs - completely unnecessary.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
but just to establish how effective
might be the new version of John the Ripper.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* Be careful of your thoughts; they may become words at any moment. -Ira
Gassen */
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM
Yeah, about that: What ~is~ a "controled program"? I noticed that
qualification, but my background is apps development and I'm woefully
ignorant in spots.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* Expecting the world to treat you fairly because you are a g
database.
In the Swedish hack, the original stolen ID had read access to the RACF
database. The hackers downloaded the database, then applied a dictionary
attack to it at their leisure, thus getting thousands of passwords not only
in that LPAR but in another one visited by the same use
nt three clients
seem all to have this feature turned on, that is, they're controling access
to dumps.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* If the Earth were flat, cats would have pushed everything off it by now.
*/
-Original Message-
From: IBM Mainframe Discussio
as to maximize the number of systems that are secured.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* Unspecified error; smash forehead on keyboard to continue. */
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Nightwat
y auto-run event processing. I was not an inveterate MS-basher, but
I nearly became one for a while. Then they finally began to see the light -
~very~ late, in my opinion, but better late than never.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* I don't want the cheese
progress toward figuring out Colossal Cave's "magic mode"
before I left there for another job. It's primarily by remembering those days
that I came to understand why MVS users nowadays need special authority to
create a program dump.
---
Bob Bridges, robhbrid...@gmail.com, cell 33
when the ID was created. Using a standalone PC they cracked about 30 000
passwords (out of 120 000 on Applicat’s database) in 'a couple of days'."
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* If the Earth were flat, cats would have pushed everything off it
ant you to think I'm
claiming expertise in the subject.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
/* If the Earth were flat, cats would have pushed everything off it by now. */
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.E
ndows' life it was essentially a
one-operator OS; whatever you did to Windows was just you, not (usually)
someone reaching in from outside.
Then, too, it took a while for MS to get religion about security.
But first and foremost, IMVHO, it's that MVS has been around so much longer.
;t tell me anything, but can you
provide some background? I don't know what I would see in an ABMLISTing that
would tell me anything I need to know about a CSI.
---
Bob Bridges, cell 336 382-7313
robhbrid...@gmail.com
rbrid...@infosecinc.com
/* Paramedic Rule #2: All bleeding stopseve
and peruse the documentation.
You probably won't hear many more questions from me for a while, therefore,
but I'm certain to be back eventually.
---
Bob Bridges, cell 336 382-7313
robhbrid...@gmail.com
rbrid...@infosecinc.com
/* A fanatic is someone who does what he knows God
Carmen, what do you mean by "not all PTFs will apply or restore"? If you mean
that there's a PTF that cannot be applied, how then is it a PTF? And if you
can APPLY it but not RESTORE...I'm incredulous. Can you expand on that?
---
Bob Bridges, cell 336 382-7313
robhbrid.
d numbers are
slightly more work but For multiple contributors and especially for multiple
iterations they add a great deal to clarity; see below.
---
Bob Bridges, cell 336 382-7313
robhbrid...@gmail.com
rbrid...@infosecinc.com
/* Law #31 of combat operations: If the enemy is within rang
Never heard of CA-MSM, but I'll look into it. (I've been in contact with Bob
Boerum at CA, but he's never mentioned it.)
We've been using the SMP/E panels, and, as you say, letting them construct the
JCL.
---
Bob Bridges, cell 336 382-7313
robhbrid...@gmail.com
rbr
for various reasons. It doesn't seem to, though; it names them and
complains about them, but doesn't add them to the list. Have I misunderstood
something? I'm loathe to believe the documentation is flat wrong.
If you're getting ready to send rushed messages saying
It wrapped at my end, but I don't see the problem; if I want to follow the
link I'll just reässemble it.
---
Bob Bridges, cell 336 382-7313
robhbrid...@gmail.com
rbrid...@infosecinc.com
/* Think hard about whether a voice-enabled device is right for you. That
includes products f
an be
removed?
If this is not the right place to ask, feel free to steer me somewhere else,
with or without derisive flames as it suits you :). I'm reading documentation,
but it's also nice to get confirmation from experienced admins, especially in a
subject with so many corners and
901 - 927 of 927 matches
Mail list logo