× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



> 
> And it you were an AS/400 security guy, you wouldn't do
> the same thing ? ;-)
>

The simple notion that one believes that one is a "security guy" does
not in itself give license to try to break into someone else's system.
If you give me permission (and, these days, pay me :), I'll test the
security of your system.  That is a small part of what makes me a
"security guy".  

However, if I try to break into your system simply because I think I may
be able to, I'm not acting as a "security guy", I'm really just a cheap
hacker committing criminal trespass.

Mel Beckman once said to me that most hackers are the internet
equivalent of doorknob rattlers.  They cruise networks looking for
unlocked doors and then thump their chest over their technical prowess
at having opened said unlocked doors.  The reality is that they are just
petty criminals who lack the moral compass that compels the rest of us
to stay out of each other's house, car, or computer.

So raise your glass to Mel, because I believe he hit the nail squarely
on the head there.

jte

--
John Earl | Chief Technology Officer
The PowerTech Group
19426 68th Ave. S
Seattle, WA 98032
(253) 872-7788 ext. 302
john.earl@xxxxxxxxxxxxx
www.powertech.com 
 

 
This email message and any attachments are intended only for the use of
the intended recipients and may contain information that is privileged
and confidential. If you are not the intended recipient, any
dissemination, distribution, or copying is strictly prohibited. If you
received this email message in error, please immediately notify the
sender by replying to this email message, or by telephone, and delete
the message from your email system.
--

> -----Original Message-----
> From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-
> bounces@xxxxxxxxxxxx] On Behalf Of Chuck Lewis
> Sent: Monday, July 12, 2004 6:58 AM
> To: 'Midrange Systems Technical Discussion'
> Subject: RE: Hope conference talk on hacking the AS/400
> 
> And it you were an AS/400 security guy, you wouldn't do
> the same thing ? ;-)
> 
> -----Original Message-----
> From: midrange-l-bounces@xxxxxxxxxxxx
> [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Alan
> Sent: Sunday, July 11, 2004 9:58 PM
> To: Midrange Systems Technical Discussion
> Subject: Re: Hope conference talk on hacking the AS/400
> 
> For what it's worth, the city in the address is very near
> there.
> 
> A while before that, I had an operations guy from Carnival
> Cruises in my
> AS/400 classes (circa 1992-1993?) and caught him trying
> all the default
> passwords on the class workstations (Class was lab). Don't
> remember the
> guy's name. Sheesh. That's in this area.
> 
> - Alan
> 
> 
> --
> This is the Midrange Systems Technical Discussion
> (MIDRANGE-L) mailing list
> To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit:
> http://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the
> archives
> at http://archive.midrange.com/midrange-l.



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.