> On Saturday, August 12, 2023 at 06:04:55 PM PDT, Grant Taylor wrote:
> These statements cause me to pause. They seem somewhat antithetical to
> welcoming and encouraging people to use the mainframe / z/OS.
> Why is it absurd to allow everyone to do a Proof Of Concept on z/OS?
You're
> On Monday, August 7, 2023 at 04:33:24 PM PDT, Andrew Rowley
> wrote:
> It comes back to the question I asked earlier - how much space is it
> reasonable to use *to do your job* before you have to get the storage
> admin involved?
Since you put it that way, I've got to say are you insane.
Responding primarily to Tony, I'll just say that when an adversary (internal or
external) gains control over the PC that the privileged storage administrator
uses, particularly when there's no true multi-factor authentication in the
loop, then it's probably "game over."
—
Timothy Sipples
> On Saturday, August 12, 2023 at 05:54:10 PM PDT, Grant Taylor wrote:
>>On 8/7/23 12:26 PM, Jon Perryman wrote:
>> Was it a smart decision for IBM to sell the software that became Microsoft?
> Please clarify what IBM sold to Microsoft.
> - Microsoft had (MS-)DOS independent of and without
Mixing fact & fiction. Interesting.
Sent from Yahoo Mail for iPhone
On Sunday, August 13, 2023, 2:23 PM, Bob Bridges wrote:
Seems likely to me that every half-decent scam, without exception, will find
gulls in every new generation.
Not quite the same thing, but I remember a comment on a
Seems likely to me that every half-decent scam, without exception, will find
gulls in every new generation.
Not quite the same thing, but I remember a comment on a bulletin board
during one of the wars that sprang up in southern Africa after the white
government in South Africa fell and was taken
Charles Mills added:
>The long periods of bad guy access are typical. You read most of the
>breach stories the attack unfolded over weeks or months. The hackers
>talk about pwning (owning) a group of servers.
Oh, I know. I was just noting that I cannot imagine dealing with that kind of
ongoing
My father was a journalist, and about twice a decade he would write a feature
article on scams. I was shocked at the fact that criminals could successfully
use well known ancient scams instead of inventing new ones. I would have
naíevely thought that nobody in this day and age would fall for
Bob,
Few days ago a hospital in central Israel got a ransomware attack by a
group of hackers named Block Shadow. Two years ago another hospital was
attacked. The total cost of recovering (nothing paid to the attacking group
afaik) was estimated about 36 million ILS, about $10 Million USD.
It is documented in the original patent as far as I can see, but I haven't
looked in dept into both the patent and the java example:
https://www.freepatentsonline.com/4814746.html
But I'm not sure if that will give you enough information. It depends on what
you are trying to achieve with the
10 matches
Mail list logo