|
Is there an article or discussion you can point me towards? I'd like
to know, even if just theoretical, how User A could see User B's
traffic when the iSeries is en/decrypting all of the comm.
All traffic on the physical wire would be encrypted so it has to be
some way for User A to see either User B's job, their pre-encryption
traffic on the source system, or the post-encryption traffic on the
target system.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.