> While z/OS is probably immune to executables being introduced from > outside, how vulnerable is....
This really isn't a safe assumption, so all of the subsequent questions are kind of irrelevant. Yes, it is possible to configure a z/OS system so that it is extremely difficult to break into, but when you present a harder target, the universe just coughs up a better class of hacker in return. Sort of a yin and yang thing I guess. Anyway, I recommend taking the time to read this wiki post on Stuxnet and then play a few "what if?" scenarios in your head. Very sobering. Enjoy <http://en.wikipedia.org/wiki/Stuxnet> ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN

