|
> I've > never heard of anybody successfully hacking an AS/400 from outside. > The > whole point is that if the security built into the AS/400 is rendered > meaningless, then the AS/400 will lose its biggest selling point, the > biggest > single reason a customer could have for paying a premium for an > AS/400, rather > than simply buying an NT server from the lowest > bidder. Sorry to burst anybody's bubble... Starting with simple communications and NO USER PROFILE ON TARGET MACHINE... Been there, done it, have witnesses! So have others! Steve Glanstein mic@aloha.com > > -- > James_H._H._Lampert > Professional_Dilettante who's quite > content to use the instructions supported > by > QPRCRTPG. > > > +--- | This is the MI Programmers Mailing List! | To submit a new message, send your mail to MI400@midrange.com. | To subscribe to this list send email to MI400-SUB@midrange.com. | To unsubscribe from this list send email to MI400-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: dr2@cssas400.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.