|
We have the locked computer room. And we don't let the janitors in after they tried to play video games on the dumb terminals YEARS ago. After awhile you have to determine what is an acceptable risk. Yes you could employ biometrics, etc. But someone could still tap your phone line with a Cray to decrypt transmissions. But after awhile the 'cones of silence' really get into the way. Rob Berendt -- 'cones of silence' comes from the Get Smart move "The Nude Bomb". "Norbut, Jim" <Jim.Norbut@Grubb-E To: "'midrange-l@midrange.com'" <midrange-l@midrange.com> llis.com> cc: Sent by: Fax to: midrange-l-admin@mi Subject: RE: how to have AS/400 console at home drange.com 02/26/2002 05:03 PM Please respond to midrange-l Worst case scenario....but absolutely true. Jim Norbut Systems Administrator Grubb & Ellis Company Phone (847) 753-7620 Fax (847) 753-9854 -----Original Message----- From: Steve McKay [mailto:Steve.McKay@SouthTrust.com] Sent: Tuesday, February 26, 2002 3:52 PM To: midrange-l@midrange.com Subject: Re: how to have AS/400 console at home Jeffry wrote: "PC anywhere has a password, your PC has a password and the AS/400 has a password. Plus someone has to know the dial-in phone number." Jeffry - I pose this scenario in all sincerity as a matter of my own curiousity - Suppose I'm a bad guy working part-time as the janitor at your company. One night I'm cleaning up around your office and I hear your modem negotiating a connection. As I stand there, I see you take control of your PC, open a connection to the AS/400, sign-on and start doing "stuff". Being an educated bad guy (whose probation terms say that I can't touch a computer - that's why I'm your janitor), I realize that there are many files on this AS/400 that I would like to have copies of or make changes to - and I've got an "already signed-on" connection. Now the question - If I pull the phone cable out of the PC modem on your desk, can I take over the "already signed-on" session and have my way with your AS/400?? (I don't know the answer but I would guess "yes"). Thanks, Steve _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@midrange.com To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l or email: MIDRANGE-L-request@midrange.com Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@midrange.com To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l or email: MIDRANGE-L-request@midrange.com Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.