|
I am asking this question so that I can understand and anticipate any Security issues for the PREVENTION of such an occurrance. What after all is A SECURITY OFFICER SUPPOSED to do but to understand what COULD happen, and show how her/she has a plan to prevent it, a testing system, whereby he/she can test this concern. This is from a threat outside of the AS/400. Internally, there are issues of a user adopting a higher authority. Potentially anyone who has ALLOBJ can wreak havoc. How do you plan for a lunatic programmer who wipes out records either inadvertantly or maliciously? How to prevent these problems and what these problems are in total is what I am looking for here? Rob Colin Williams <colin.williams@xxxxxxxxxxxx> wrote: Rob, I love the machine too much to even consider such a thing. I am shocked, nay....flabbergasted ..., that anyone would even want to consider doing such a bad thing! (tears, boo..hoo) Cheers Colin.W -----Original Message----- From: Rob Phillips [mailto:niceguy420l@xxxxxxxxx] Sent: 28 January 2004 14:31 To: Midrange Systems Technical Discussion Subject: Research Project- If you wanted to Hack an AS/400 theoretically, what would you do? (NFM) --------------------------------- Do you Yahoo!? Yahoo! SiteBuilder - Free web site building tool. Try it! _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. This e-mail has been sent by a company of Bertram Group Ltd, whose registered office is The Nest, Rosary Road Norwich NR1 1TF. This message, and any attachments, are intended solely for the addressee and may contain privileged or confidential information. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. If you believe that you have received this email in error, please contact the sender immediately. Opinions, conclusions and statements of intent in this e-mail are those of the sender and will not bind a Bertram Group Ltd company unless confirmed in writing by a director independently of this message. Although we have taken steps to ensure that this email and any attachments are free from any virus, we advise that in keeping with good computing practice the recipient should ensure they are actually virus free. _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. --------------------------------- Do you Yahoo!? Yahoo! SiteBuilder - Free web site building tool. Try it!
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.