What effect would this same hack have on the intended target if the x86
system being targeted was running as a guest under z/VM? Wouldn't the
ill effects be reduced by the wall between virtual guests inherent with
z/VM?
The x86 hypervisors have a wall between guests too. The first
What I would like to do is take a list of CMS files and package them
together as a single data file compatible with the TSO XMIT and Windows
XMIT-Manager programs. I have looked at the PIPELINES BLOCK NETDATA (I
am not that good a plumber) and at stacking NETDATA output files
together
I was going to say that my grandkids could show me how to watch this,
but then I noticed a msg on that You Tube screen saying The URL
contained a malformed video ID.
Anyone with a solution?
http://www.youtube.com/watch?v=3Dj2fURxbdIZs
Ah, the 4,178,931,460'th victim of
If that is correct, the universe shall come to an end soon. Where's
the restaurant, and my blanket?
Towel. The cool frood never loses his towel, not his blanket.
De