lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20990000.1063207921@biber.york.ac.uk>
From: ajc22 at york.ac.uk (Arthur Clune)
Subject: Fwd: How to Steal a Mainframe 

--On 05/09/03 21:56:21 -0400 Valdis.Kletnieks@...edu wrote:

> Even
> a *small* S/390 or z-series system can have 48 channel cables on it, 128
> is not at all uncommon - and IBM uses some pretty hefty screws to hold
> them in place.

Just to point out the (maybe) obvious - why unscrew all those screws when 
you
can just cut the cables? After all, you are *stealing* the thing. Allow a 
little extra
time to tidy up all those loose ends of cables (shove them back under the 
floor?)
and away you go.

Arthur

-- 
Arthur Clune, Systems Security Advisor, The Computing Service
University of York, UK, YO10 5DD.  +44 (0) 1904 433129


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ