Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-02-06 Thread Kim Goldenberg
Steve Flynn wrote: On 06/02/07, Kim Goldenberg <[EMAIL PROTECTED]> wrote: > (I guess this is to Shane?) I'd try swapping out the memory, and/or swapping the memory sticks in the machine and see if it gets past that point. Usually, if memtest86 shops for some reason, there is a memory problem; p

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-02-06 Thread Steve Flynn
On 06/02/07, Kim Goldenberg <[EMAIL PROTECTED]> wrote: > (I guess this is to Shane?) I'd try swapping out the memory, and/or swapping the memory sticks in the machine and see if it gets past that point. Usually, if memtest86 shops for some reason, there is a memory problem; probably it's in the

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-02-06 Thread Kim Goldenberg
Binyamin Dissen wrote: On Tue, 23 Jan 2007 06:07:29 +1000 Shane <[EMAIL PROTECTED]> wrote: :>On Mon, 2007-01-22 at 14:48 -0500, Knutson, Sam wrote: :>> I like http://www.memtest86.com/ FREE, GPL, bootable ISO you can :>> download. :>Ditto - and is an option on every boot menu on every one

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-02-06 Thread Binyamin Dissen
On Tue, 23 Jan 2007 06:07:29 +1000 Shane <[EMAIL PROTECTED]> wrote: :>On Mon, 2007-01-22 at 14:48 -0500, Knutson, Sam wrote: :>> I like http://www.memtest86.com/ FREE, GPL, bootable ISO you can :>> download. :>Ditto - and is an option on every boot menu on every one of my systems. :>And it's

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-25 Thread Jim Phoenix
Clark Morris wrote: But how do we get the message across to the non-technical people in charge of purchasing or authorizing purchase of laptops that this is important when you can get the My Eyes Glaze Over effect when you try to explain it to many IT professionals? I think the Hasp song book so

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-23 Thread Howard Brazee
On 23 Jan 2007 11:00:44 -0800, [EMAIL PROTECTED] (Clark Morris) wrote: >But how do we get the message across to the non-technical people in >charge of purchasing or authorizing purchase of laptops that this is >important when you can get the My Eyes Glaze Over effect when you try >to explain it to

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-23 Thread David Andrews
On Tue, 2007-01-23 at 15:00 -0400, Clark Morris wrote: > But how do we get the message across to the non-technical people in > charge of purchasing or authorizing purchase of laptops that this is > important You're asking ME? My shop is spinning down the m/f in favor of a SAP implementation on Wi

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-23 Thread Clark Morris
On 23 Jan 2007 09:20:43 -0800, in bit.listserv.ibm-main you wrote: >On Mon, 2007-01-22 at 20:05 +0100, R.S. wrote: >> David Andrews wrote: >> [...] >> > Some years ago we had a mixture of servers running NetWare [...] >> > raised a NMI [...] on the average of once a month > >> Once a month? What h

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-23 Thread David Andrews
On Mon, 2007-01-22 at 20:05 +0100, R.S. wrote: > David Andrews wrote: > [...] > > Some years ago we had a mixture of servers running NetWare [...] > > raised a NMI [...] on the average of once a month > Once a month? What hardware did you use??? Those were (IIRC) HP Netserver LEs and LFs. I did

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread Howard Brazee
On 22 Jan 2007 11:48:28 -0800, [EMAIL PROTECTED] (Knutson, Sam) wrote: >I like http://www.memtest86.com/ FREE, GPL, bootable ISO you can >download. That's the one I've left running for a couple of days without finding a memory problem.

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread Shane
On Mon, 2007-01-22 at 14:48 -0500, Knutson, Sam wrote: > I like http://www.memtest86.com/ FREE, GPL, bootable ISO you can > download. Ditto - and is an option on every boot menu on every one of my systems. And it's usually on any Linux liveCD - and I've truckloads of them laying around. And

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread Knutson, Sam
al Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Tom Moulder Sent: Monday, January 22, 2007 10:18 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle) Howard When I ran the memory test

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread R.S.
David Andrews wrote: [...] Some years ago we had a mixture of servers running NetWare -- some of them had ECC memory and some had parity. The ECC-checked servers never burped, but when the parity-checked servers detected a memory fault they raised a NMI and NetWare stopped hard. This happened o

Re: Decoding the encryption puzzle

2007-01-22 Thread Ted MacNEIL
>>$12? 6/8 GB? (NOTE: That's a 'G' -- GIG!) >When I gave that amount, I did not specify a size. Then how can we compare? I gave $100.00 for 8GB. You gave $12.00 for WHAT? This makes the response less than useful. . Questions? Concerns? (Screams of Outrage?) ---

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread Tom Marchant
On Mon, 22 Jan 2007 08:06:08 -0700, Howard Brazee wrote: >On 22 Jan 2007 05:33:23 -0800, (David Andrews) wrote: > >>How do you tell the difference between crashes due to memory failures >>and crashes due to crapware? > >I have a very flaky computer - but repeated long memory tests have not >shown

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread Tom Moulder
:06 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle) On 22 Jan 2007 05:33:23 -0800, [EMAIL PROTECTED] (David Andrews) wrote: >How do you tell the difference between crashes due to memory failures >and crashes

Re: Decoding the encryption puzzle

2007-01-22 Thread Howard Brazee
On 19 Jan 2007 13:18:32 -0800, [EMAIL PROTECTED] (Ted MacNEIL) wrote: >$12? 6/8 GB? (NOTE: That's a 'G' -- GIG!) When I gave that amount, I did not specify a size. The small guys are used for copying data from computer to computer - and they are still larger than mainframe partitions I worked wi

Re: Decoding the encryption puzzle

2007-01-22 Thread Howard Brazee
On 21 Jan 2007 08:03:52 -0800, [EMAIL PROTECTED] (Shmuel Metz , Seymour J.) wrote: >>Decades before, people kept printed copies of programs they wrote. > >The Devil is in the details. Were those programs proprietary? Did >those people also take copies of legally protected financial or >personnel f

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread Howard Brazee
On 22 Jan 2007 05:33:23 -0800, [EMAIL PROTECTED] (David Andrews) wrote: >How do you tell the difference between crashes due to memory failures >and crashes due to crapware? I have a very flaky computer - but repeated long memory tests have not shown the problem to be memory.A workplace could

Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread Tom Marchant
On Fri, 19 Jan 2007 11:03:20 -0600, Eric Chevalier wrote: > >Come on, folks; let's have a little perspective on this issue! Perhaps >you can't find laptops with ECC memory because the non-ECC memory is >completely reliable for all _practical_ purposes? Am I running a risk >of data corruption on my

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-22 Thread David Andrews
On Sun, 2007-01-21 at 12:59 -0400, Clark Morris wrote: > The non-ECC "seems" to be very reliable on both of the currently used > computers at home (1 desktop, 1 laptop). How do you tell the difference between crashes due to memory failures and crashes due to crapware? Some years ago we had a mixt

Re: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-21 Thread Tom Moulder
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Clark Morris Sent: Sunday, January 21, 2007 10:59 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle) The non-ECC "seem

Non - ECC, non-parity memory was Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-21 Thread Clark Morris
On 20 Jan 2007 18:27:24 -0800, in bit.listserv.ibm-main you wrote: >In <[EMAIL PROTECTED]>, on 01/19/2007 > at 11:03 AM, Eric Chevalier <[EMAIL PROTECTED]> said: > >>Come on, folks; let's have a little perspective on this issue! >>Perhaps you can't find laptops with ECC memory because the non-EC

Re: Decoding the encryption puzzle

2007-01-21 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on 01/19/2007 at 12:47 PM, Howard Brazee <[EMAIL PROTECTED]> said: >Decades before, people kept printed copies of programs they wrote. The Devil is in the details. Were those programs proprietary? Did those people also take copies of legally protected financial or perso

Re: Risks (Was Re: Decoding the encryption puzzle)

2007-01-20 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on 01/19/2007 at 11:03 AM, Eric Chevalier <[EMAIL PROTECTED]> said: >Come on, folks; let's have a little perspective on this issue! >Perhaps you can't find laptops with ECC memory because the non-ECC >memory is completely reliable for all _practical_ purposes? Perhaps i

Re: Decoding the encryption puzzle

2007-01-19 Thread Graeme Gibson
That's a USB-connected stand-alone hard drive, not a memory stick. I don't know about that, but here is 500GB for $158: http://ecost.com/ecost/shop/detail.asp?DPNo=705654 At 08:27 AM 1/20/2007, you wrote: > From: Ted MacNEIL <[EMAIL PROTECTED]> > Date: Fri, January 19, 2007 4:22 pm > > $12?

Re: Decoding the encryption puzzle

2007-01-19 Thread Ted MacNEIL
>I downloaded one PDS to the mainframe at my current job, but I do look at other stuff on the CDs every now and then. It can be very helpfull. It can also be theft of intellectual property! . Questions? Concerns? (Screams of Outrage?) ---

Re: Decoding the encryption puzzle

2007-01-19 Thread Eric N. Bielefeld
The last 2 weeks I spent at my last job, I spent a lot of time FTPing stuff to my PC. I made 2 CDs worth, as it wouldn't quite fit on 1 CD. I kept all my JCL libraries, all of the mainframe system documentation libraries I could find, and all of our Parmlib, system Proclib, etc. There was no

Re: Decoding the encryption puzzle

2007-01-19 Thread Dave Reinken
> From: Ted MacNEIL <[EMAIL PROTECTED]> > Date: Fri, January 19, 2007 4:22 pm > > $12? 6/8 GB? (NOTE: That's a 'G' -- GIG!) I don't know about that, but here is 500GB for $158: http://ecost.com/ecost/shop/detail.asp?DPNo=705654 Storage costs are WAY down... Buy two, 1TB for $316 ain't bad... --

Re: Decoding the encryption puzzle

2007-01-19 Thread Ted MacNEIL
>Decades before, people kept printed copies of programs they wrote. >Sometimes they even used them in job interviews. >Is that significantly different? No. They're both wrong. It's just easier, now. $12? 6/8 GB? (NOTE: That's a 'G' -- GIG!) . Questions? Concerns? (Screams of Outrage?) --

Re: Decoding the encryption puzzle

2007-01-19 Thread Anne & Lynn Wheeler
tment" equation. something that might have 1percent fraud ... if it changed by two orders of magnitude ... it could go to nearly all fraud ... possibly resulting in collapse of the infrastructure recent posts in this thread: http://www.garlic.com/~lynn/2007c.html#1 Decoding the encryption p

Re: Decoding the encryption puzzle

2007-01-19 Thread Anne & Lynn Wheeler
Anne & Lynn Wheeler wrote: for a little drift ... another crypto related thread (FDE ... full disk encryption) http://www.garlic.com/~lynn/aadsm26.htm#23 It's a Presidential Mandate, Feds use it. How come you are not using FDE? re: http://www.garlic.com/~lynn/2007c.html#1 Dec

Re: Decoding the encryption puzzle

2007-01-19 Thread Howard Brazee
On 19 Jan 2007 09:15:38 -0800, [EMAIL PROTECTED] (Ted MacNEIL) wrote: >Two days after I bought a 6GB USB drive for $117 CDN, I saw an 8GB one at The >Source by Circuit City (formerly Radio Shack), for $105. I've seen drives for around $12. >Years ago, I saw somebody bring in their own 30GB hard

Re: Decoding the encryption puzzle

2007-01-19 Thread Jeffrey Deaver
>So what happens when that disgruntled employee decrypts >a tape and downloads it to a USB memory stick and walks >out the door with that ??? Data loss (theft) and need to notify - if you even know about it. There are products available for PCs/laptops that will stop data copies to removable med

Re: Decoding the encryption puzzle

2007-01-19 Thread Howard Brazee
On 19 Jan 2007 09:10:53 -0800, [EMAIL PROTECTED] wrote: >One necessary step to security where desktops connect to secure >information is to disable all outbound ports on the desktop. Don't know >if it is a windoz feature or ISV software. Why not go all the way? Replace the customers' compute

Re: Decoding the encryption puzzle

2007-01-19 Thread Howard Brazee
On 19 Jan 2007 08:57:13 -0800, [EMAIL PROTECTED] (Dave Kopischke) wrote: >So what happens when that disgruntled employee decrypts a tape and >downloads it to a USB memory stick and walks out the door with that ??? >Those memory sticks hold a lot of information and they're very small. At >some p

Re: Decoding the encryption puzzle

2007-01-19 Thread Ted MacNEIL
>Those memory sticks hold a lot of information and they're very small. Two days after I bought a 6GB USB drive for $117 CDN, I saw an 8GB one at The Source by Circuit City (formerly Radio Shack), for $105. Years ago, I saw somebody bring in their own 30GB hard drive, after creating XMIT unloads

Re: Decoding the encryption puzzle

2007-01-19 Thread Kirk Talman
One necessary step to security where desktops connect to secure information is to disable all outbound ports on the desktop. Don't know if it is a windoz feature or ISV software. IBM Mainframe Discussion List wrote on 01/19/2007 11:56:52 AM: > So what happens when that disgruntled employee d

Risks (Was Re: Decoding the encryption puzzle)

2007-01-19 Thread Eric Chevalier
On 19 Jan 2007 05:29:45 -0800, [EMAIL PROTECTED] (Tom Marchant) wrote: >On Fri, 19 Jan 2007 07:08:19 -0500, Shmuel Metz (Seymour J.) wrote: > >>Machines without any error checking don't even qualify as >>etch-a-sketch; they're just junk. > >When the IBM PC was first introduced in 1981, it was the

Re: Decoding the encryption puzzle

2007-01-19 Thread Dave Kopischke
On Thu, 18 Jan 2007 19:44:29 -0600, Jeffrey Deaver wrote: >Its too easy for one of those 'secure' tapes to walk out the door with a >disgruntled employee. And when the audit turns up a tape missing - its not >going to care how or where it went - only that its missing and not >encrypted. More tha

Re: Decoding the encryption puzzle

2007-01-19 Thread Jeffrey D. Smith
> -Original Message- > From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On > Behalf Of Jeffrey Deaver > Sent: Thursday, January 18, 2007 6:44 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Re: Decoding the encryption puzzle > > >I wouldn't encrypt da

Re: Decoding the encryption puzzle

2007-01-19 Thread Clark Morris
On 19 Jan 2007 05:07:48 -0800, in bit.listserv.ibm-main you wrote: >In <[EMAIL PROTECTED]>, on 01/18/2007 > at 04:55 PM, Tom Schmidt <[EMAIL PROTECTED]> said: > >>You are describing one of the core differences between real >>mainframes and etch-a-sketch computers -- the real McCoy use parity >>

Re: Decoding the encryption puzzle

2007-01-19 Thread Ed Finnell
In a message dated 1/19/2007 12:13:02 A.M. Central Standard Time, [EMAIL PROTECTED] writes: particle hits on memory were possible. I don't recall the precise figures, but seem to recall it was around one hit per megabyte per 10**4 or 10**5 hours. For memory with any means of error correc

Re: Decoding the encryption puzzle

2007-01-19 Thread Tom Marchant
On Fri, 19 Jan 2007 07:08:19 -0500, Shmuel Metz (Seymour J.) wrote: >In <[EMAIL PROTECTED]>, on 01/18/2007 > at 04:55 PM, Tom Schmidt said: > >>You are describing one of the core differences between real >>mainframes and etch-a-sketch computers -- the real McCoy use parity >>for memory > >Parit

Re: Decoding the encryption puzzle

2007-01-19 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on 01/18/2007 at 04:55 PM, Tom Schmidt <[EMAIL PROTECTED]> said: >You are describing one of the core differences between real >mainframes and etch-a-sketch computers -- the real McCoy use parity >for memory Parity is so 1950's. The real McCoy uses ECC, with logging of

Re: Decoding the encryption puzzle

2007-01-18 Thread Gerhard Postpischil
Kirk Talman wrote: 2) on a ceramic substrate foolishly made from clay not tested for the presence of radioactive impurities, it is highly unlikely an alpha particle, regardless of its diet and lack of exercise, will make it to a chip. I seem to remember an article by IBM staffers in Scientifi

Re: Decoding the encryption puzzle

2007-01-18 Thread Jeffrey Deaver
>If one of your tapes walks out the door with a disgruntled employee, then you >have the wrong guards on the door. They are not just supposed to be there for >decoration. No one person or organization can be responsible for the security >of EVERYTHING. So make sure your guards do their job and you

Re: Decoding the encryption puzzle

2007-01-18 Thread Thomas Kern
If one of your tapes walks out the door with a disgruntled employee, then you have the wrong guards on the door. They are not just supposed to be there for decoration. No one person or organization can be responsible for the security of EVERYTHING. So make sure your guards do their job and you hand

Re: Decoding the encryption puzzle

2007-01-18 Thread Jeffrey Deaver
>I wouldn't encrypt data within a datacenter. The only data that gets >encrypted around here is data that goes out the door. Internal tapes are >not encrypted. >If one level of backup are in your automated tape library, in a data center >with card-key access in a building with armed guards on all

Re: Decoding the encryption puzzle

2007-01-18 Thread Anne & Lynn Wheeler
Hal Merritt wrote: The encryption software starts before Windows. The software failed with a blue screen of death. My sense is that one or more critical files on the hard drive used by the software became corrupt as PC files are known to do. But I don't know. But my point was the laptop was

Re: Decoding the encryption puzzle

2007-01-18 Thread Thomas Kern
The encryption of data on a backup tape does not need to be done ALL the time. If one level of backup are in your automated tape library, in a data center with card-key access in a building with armed guards on all entrances who inspect packages coming in AND going out, then I don't think you need

Re: Decoding the encryption puzzle

2007-01-18 Thread Kirk Talman
Unless the chip is: 1) on a voyage outside our atmosphere or 2) on a ceramic substrate foolishly made from clay not tested for the presence of radioactive impurities, it is highly unlikely an alpha particle, regardless of its diet and lack of exercise, will make it to a chip. Those of terres

Re: Decoding the encryption puzzle

2007-01-18 Thread Dave Kopischke
On Thu, 18 Jan 2007 14:53:01 -0600, Hal Merritt wrote: >The complete loss of mission critical data even for a few days could be catastrophic to the company. One solution is to have backups that aren't encrypted. But, then, what would be the point of encryption in the first place? As I said, a p

Re: Decoding the encryption puzzle

2007-01-18 Thread Tom Schmidt
On Thu, 18 Jan 2007 14:53:01 -0600, Hal Merritt wrote: >The encryption software starts before Windows. The software failed with a blue screen of death. > >My sense is that one or more critical files on the hard drive used by the software became corrupt as PC files are known to do. But I don't kn

Re: Decoding the encryption puzzle

2007-01-18 Thread Hal Merritt
But, then, what would be the point of encryption in the first place? As I said, a puzzlement. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Jeffrey D. Smith Sent: Thursday, January 18, 2007 1:33 PM To: IBM-MAIN@BAMA.UA.EDU Subject: R

Re: Decoding the encryption puzzle

2007-01-18 Thread David Andrews
On Thu, 2007-01-18 at 11:49 -0600, Hal Merritt wrote: > The failure was in the encryption software. Perhaps the failure was "bit rot" in that cheap notebook hard drive? Most desktop systems don't do much in the way of file integrity, so when decryption fails on a corrupt file it fails spectacular

Re: Decoding the encryption puzzle

2007-01-18 Thread Jeffrey D. Smith
> -Original Message- > From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On > Behalf Of Hal Merritt > Sent: Thursday, January 18, 2007 10:49 AM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Decoding the encryption puzzle > > There I was, looking into the teet

Re: Decoding the encryption puzzle

2007-01-18 Thread Thomas Kern
I cannot say that mainframe encryption software is NEVER wrong, but I can say that I have been using various mainframe encryption processes for 30 years (and a few days) and I have 'lost' data 5 times. I could not remember the encryption key those 5 times. I still have those files and once in a whi

Decoding the encryption puzzle

2007-01-18 Thread Hal Merritt
There I was, looking into the teeth of a serious ice storm, any my company laptop dies. I have a generator and satellite telecom so that part was covered. But the laptop was a single point of failure between me working from home or risking life and limb having to go out in the storm. The prospect o