|
I've seen this often in the past. I my case it was users doing a "SNDCMD" operation that would have a CHGCMD command sent to a remote site. I was able to read in black and white all the passwords... Recommended that they sign on to each system and do it individually. Maybe the question would be better asked in the Security forum. Get the "big guns" answering... -----Original Message----- From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of rob@xxxxxxxxx Sent: Monday, September 18, 2006 12:28 PM To: midrange-l@xxxxxxxxxxxx Subject: CMD, DSPINP, SBMJOB Keep in mind that if you prompt a command like CHGUSRPRF and put in a password, and then hit F9, or look at DSPJOBLOG, you will not see the password. However if I do SBMJOB CMD(CHGUSRPRF USRPRF(ROB) PASSWORD(spud)) And then hit F9, once again I'll see SBMJOB CMD(CHGUSRPRF USRPRF(ROB) PASSWORD(spud)) and I'll also see it in DSPJOBLOG. Has it always worked like this? I am on V5R4 and have been for awhile. Does anyone find an issue with this? Rob Berendt -- Group Dekko Services, LLC Dept 01.073 PO Box 2000 Dock 108 6928N 400E Kendallville, IN 46755 http://www.dekko.com -- This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.