Please see inline...


| -----Original Message-----
| From:
| []On Behalf Of
| Sent: Wednesday, December 19, 2001 7:14 PM
| To:
| Subject: IBM supplied QPGMR (was Modify SYSVAL QSYSLIBL)
| Hi Simon,
| >>Why this happened is he tried to start QSH after the V4R5 upgrade.
| >>For some reason it was not installed properly, but he found that
| >>there was a QSH in QSYSV4R4M0, hence the rest.
| >And you are paying this person real money?  Can I come and work for you?
| >I could be asleep for most of the day and still shine brighter than that
| >spark!  There is a serious lack of logical thought involved in
| the process
| >indicated by your paragraph.
| We all know you are bright Simon, you can work for me any time, by
| the way what are your rates (perhaps I can afford them).
| As for 'logical thought', we can't all be Vulcans (FIAWOL).
| In the meantine I will work with ordinary mortals.

I am part Vulcan and part ordinary mortal.  My Vulcan dictionary doesn't
include FIAWOL, so I am forced to assume it is slang.

===> My rates are EXTREMELY REASONABLE when I am sleeping.  That being the
case, I am planning on starting work for you in approximately one hour.  I
can generally get 6 or 7 hours work in for you each night, including
weekends.  Please mail my check at your earliest convenience.

Thank you.


| As a complete aside I was wondering what Walden was on about re. SEPT.
| This is the first I heard about SEPT.
| Seems to me that accessing system programs via SEPT completely bypass
| AS400 security checking. I am probably wrong.

The following is how Jerry Sprout explained it to me.  But this was back in
'83, so things may have changed.  I believe the general principle still

The SEPT is the System Entry Point Table.  It is an array of pointers to the
storage location of different system programs.  It's used in MI programming.

A great bit of time is spent location a program, first time it's called.
The SEPT bypasses that, by storing the location of the programs (I believe
when the OS is first installed).  A call is made to program identified by
the Nth element in the SEPT.  These positions in the array are fixed by IBM.
Someone (Simon, or maybe Tom, Phil, Walden?) noted there are two include
files which list SOME of the programs and the corresponding array element

BTW, easiest way I can think of to crater a system is to hook the SEPT.
Move a pointer to one of your programs into the SEPT array.  I wouldn't know
how to go about it, but am sure the MI-list does.

I dunno about security checking.  IIRCAIMN (and I may not) the security is
built into the pointer.

| Frank Kolmann
| _______________________________________________
| This is the Midrange Systems Technical Discussion (MIDRANGE-L)
| mailing list
| To post a message email:
| To subscribe, unsubscribe, or change list options,
| visit:
| or email:
| Before posting, please take a moment to review the archives
| at

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.