× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



This is a multi-part message in MIME format.
--
[ Picked text/plain from multipart/alternative ]
Well, you brought back memories with the delete w/ binary zeros.

I was a S/36 P/A way back when with a company that did its own payroll.
I forget the security scheme on that box, but they didn't believe me
when I told them I could see the payroll file regardless of the
"security".  Find out where the file was located and dumped the disk.  I
really love witnessing those eye-opening moments.

Dan Bale
IT - AS/400
Handleman Company
248-362-4400  Ext. 4952
D.Bale@Handleman.com

> -----Original Message-----
> From: rob@dekko.com [SMTP:rob@dekko.com]
> Sent: Thursday, August 30, 2001 4:01 PM
> To:   security400@midrange.com
> Subject:      RE: [Security400] Authority annoyances, continued...
>
>
> I knew a company in Kalamazoo that did something very similar to this
> on
> their S/34.
> Lock down the computer room
> Restore the executive data.
> Run the executive payroll
> Backup the executive payroll
> DELETE with the option to write binary '0' on all of the files
> Leave the computer room.
>
> Rob Berendt


As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.