|
I agree with most of content within your atricle, except one issue. The security experts should be worried about these systems. In most AS/400 shops, applications have been implemented without security being part of their project. With project deadlines, cloning security officer and securiy administrators have become common practice. Users with programmer authority are abundant. In addition, most AS/400 shops are forgetting to change the distributed IBM default passwords. I have had the opportunity to audit many client AS/400's and hack every single one of them, with the companies permission, of course. These systems are very vulnerable to security exposures. The really sad issue here is that managment is not taking it seriously. Other projects are more important than getting their security exposures closed. I highly recommend identifying your security exposures on these systems before providing accessibility. Think Again! And Have a Great Day! ED +--- | This is the Midrange System Mailing List! | To submit a new message, send your mail to MIDRANGE-L@midrange.com. | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com. | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.