|
| Behalf Of Leif Svalgaard | | From: jt <jt@ee.net> | > ===> Is it POSSIBLE to make the iSeries "hack-proof". | > | > So I was wondering about the back-end. Afaik, the FAST400-type | software is | > the only successful (what-could-be-termed-as) "virus" that has | run (and may | > still be running, afaik) on a 400. | | calling FAST400 a virus is not correct. It does not spread, it is not | harmful, | you pay money for it, etc. Poor terminology, perhaps. But it IS software that is running, IN SPITE OF the intent of OS/400. If Rochester can't program a way to PREVENT it from running, then it is not all that far off from a "virus". That is, unless they are prevented by legal, rather than technological reasons. | | > | > CAN these kinds-a software be prevented...? | > | yes, but it requires a hardware change. This may be coming in the new | POWER5+ systems in a few years. The SETTAG instruction and the | surrounding instructions needed to manufacture a pointer could be | moved into "firmware". FASCINATING...! But, RIGHT NOW, pragmatically speaking...? Does it require hardware change to keep data/pgms (say, voting results and algorithms) private, for all intents and purposes...
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.