|
-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-
bounces@xxxxxxxxxxxx] On Behalf Of Walden H. Leverich
This is simply untrue.and
The buffer overrun exploits that allow you to raise your security level
thus take over a machine are not possible in i5/OS.
I'll say it, since Patrick is probably too nice to do so...
Joe, taking on Patrick Botz, IBM's lead security architect for i5/OS and
the IBM Virtualization Engine, about what's possible and not possible in
i5/OS security is probably a losing battle. IF, and I stress, IF, there
are possible exploits for i5/OS, he's the one to know!
-Walden
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.