Frank, Please see inline... jt | -----Original Message----- | From: email@example.com | [mailto:firstname.lastname@example.org]On Behalf Of | Frank.Kolmann@revlon.com | Sent: Wednesday, December 19, 2001 7:14 PM | To: email@example.com | Subject: IBM supplied QPGMR (was Modify SYSVAL QSYSLIBL) | | | Hi Simon, | | | >>Why this happened is he tried to start QSH after the V4R5 upgrade. | >>For some reason it was not installed properly, but he found that | >>there was a QSH in QSYSV4R4M0, hence the rest. | | >And you are paying this person real money? Can I come and work for you? | >I could be asleep for most of the day and still shine brighter than that | >spark! There is a serious lack of logical thought involved in | the process | >indicated by your paragraph. | | We all know you are bright Simon, you can work for me any time, by | the way what are your rates (perhaps I can afford them). | As for 'logical thought', we can't all be Vulcans (FIAWOL). | In the meantine I will work with ordinary mortals. I am part Vulcan and part ordinary mortal. My Vulcan dictionary doesn't include FIAWOL, so I am forced to assume it is slang. ===> My rates are EXTREMELY REASONABLE when I am sleeping. That being the case, I am planning on starting work for you in approximately one hour. I can generally get 6 or 7 hours work in for you each night, including weekends. Please mail my check at your earliest convenience. Thank you. <snip> | | As a complete aside I was wondering what Walden was on about re. SEPT. | This is the first I heard about SEPT. | Seems to me that accessing system programs via SEPT completely bypass | AS400 security checking. I am probably wrong. The following is how Jerry Sprout explained it to me. But this was back in '83, so things may have changed. I believe the general principle still holds. The SEPT is the System Entry Point Table. It is an array of pointers to the storage location of different system programs. It's used in MI programming. A great bit of time is spent location a program, first time it's called. The SEPT bypasses that, by storing the location of the programs (I believe when the OS is first installed). A call is made to program identified by the Nth element in the SEPT. These positions in the array are fixed by IBM. Someone (Simon, or maybe Tom, Phil, Walden?) noted there are two include files which list SOME of the programs and the corresponding array element number. BTW, easiest way I can think of to crater a system is to hook the SEPT. Move a pointer to one of your programs into the SEPT array. I wouldn't know how to go about it, but am sure the MI-list does. I dunno about security checking. IIRCAIMN (and I may not) the security is built into the pointer. | | | Frank Kolmann | | _______________________________________________ | This is the Midrange Systems Technical Discussion (MIDRANGE-L) | mailing list | To post a message email: MIDRANGE-L@midrange.com | To subscribe, unsubscribe, or change list options, | visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l | or email: MIDRANGE-Lfirstname.lastname@example.org | Before posting, please take a moment to review the archives | at http://archive.midrange.com/midrange-l. |
As an Amazon Associate we earn from qualifying purchases.
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.