× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: HELP...
  • From: Victor Rodrigues <vr19089@xxxxxxxxxx>
  • Date: Fri, 7 Jan 2000 12:06:14 +0530

Hello All,
I've been asked to find loopholes in the OS/400 security. Well basically
hacking the system.
Be it accessing resources i don't have authority to or finding some other
profiles passsword or anything else for that matter. I was told by microsoft
guys in our org. that they could do this in an NT and unix. Want me to
explore the AS/400. IS THIS POSSIBLE. I've always heard that this isnt.
Has this ever been done before. Anyone worked on this before.
Request some info. on this.
Regards,
victor
+---
| This is the JAVA/400 Mailing List!
| To submit a new message, send your mail to JAVA400-L@midrange.com.
| To subscribe to this list send email to JAVA400-L-SUB@midrange.com.
| To unsubscribe from this list send email to JAVA400-L-UNSUB@midrange.com.
| Questions should be directed to the list owner: joe@zappie.net
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.