lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <003001c3753b$9639b370$0100a8c0@p3600>
From: chows at ozemail.com.au (gregh)
Subject: Fwd: How to Steal a Mainframe 

> ----- Original Message ----- 
> From: Valdis.Kletnieks@...edu 
> To: gregh 
> Cc: full-disclosure@...ts.netsys.com 
> Sent: Saturday, September 06, 2003 11:56 AM
> Subject: Re: [Full-Disclosure] Fwd: How to Steal a Mainframe 

> On Sat, 06 Sep 2003 09:44:54 +1000, gregh <chows@...mail.com.au>  said:

> > passed through these servers. What gets me is only 2 servers were stolen and yet
> > they were in there 2 hours "unhooking the computers" so it was said. Doesnt
> > take that long just to "unhook".

> Umm... We're not talking about a 5U-high Netfinity, probably.  We once had
> occasion to move an IBM 9672 (which is as near as I can tell the same size/
> class machine) across the machine room, and it was a long morning's work.  Even
> a *small* S/390 or z-series system can have 48 channel cables on it, 128 is not
> at all uncommon - and IBM uses some pretty hefty screws to hold them in place.

They put them on small trolleys and wheeled them out the door and took off with them. One seriously doubts they were anything more than high towers.

Greg.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ