×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
Dear Rob,
I made an error.
Other posts have included my company's name and phone numbers and all
the rest and it's been clear that Unbeaten Path International is a vendor.
This time the seriousness of the thread got me into a narrow thinking groove
and I got consumed by that and then I accidentally failed to make it clear that
my note about the twin girls illustration was from the v-e-n-d-o-r Unbeaten Path.
I apologize.
Can't believe I didn't even put in our phone number! <<
Warm regards,
Milt
From: rob@xxxxxxxxx
To: Midrange Systems Technical Discussion
Sent: Thursday, May 21, 2009 7:30 AM
Subject: Re: Is someone trying to hack my system?
Milt,
As a courtesy you could have
<vendor>
</vendor>
around that. We don't object, if told before hand.
And it was even appropriate for the thread.
Rob Berendt
From: Milt Habeck
To: midrange-l@xxxxxxxxxxxx
Date: 05/21/2009 07:56 AM
Subject: Is someone trying to hack my system?
W - O - W.
It's episodes like this which argue for getting system security tied
down so tight that IT departments don't have to worry even
if an uninvited party does get inside their iSeries some night.
See the "2-year-old girl in a kitchen" illustration here:
http://www.unbeatenpath.com/software/billofhealth/boh.pdf
Peace to you,
Milt
As an Amazon Associate we earn from qualifying purchases.