|
We've been down some of this road before, and the general consensus was to be "careful" of open discussion on a public posting board. Remember there are thousands world-wide that listen on midrange-l and posts here are searchable across the web. jim ----- Original Message ----- From: "Rob Phillips" <niceguy420l@xxxxxxxxx> To: "Midrange Systems Technical Discussion" <midrange-l@xxxxxxxxxxxx> Sent: Wednesday, January 28, 2004 9:30 AM Subject: Research Project- Sources Outside the AS/400 & How these affectsecurity > > HI I am looking for any published material or off-the-top-of-your-head real world knowledge. > In as much detail as possible, to explain to the ultimate network dummy, myself. > > Put another way, for testing purposed only, if you wanted to hack an AS/400. What would you do? > > Thanks a zillion, Rob > > > --------------------------------- > Do you Yahoo!? > Yahoo! SiteBuilder - Free web site building tool. Try it! > _______________________________________________ > This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list > To post a message email: MIDRANGE-L@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/midrange-l > or email: MIDRANGE-L-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/midrange-l. > >
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.