If it's on the network then you know someone can find a way in, and once they 
are in then all bets are off. Given the newer technology that has been, and is 
being, developed to crack passwords it is only a matter of when and not if.

Are WORMs really protected if they are in a virtual storage subsystem? Aren't 
they really just artifacts that have been defined as WORM but in reality are 
only protected by the software in the subsystem?

Paranoia is only false if you know that no one is after you - but can you be 
sure.


Lionel B. Dyck <sdg><
Website: https://www.lbdsoftware.com

"Worry more about your character than your reputation.  Character is what you 
are, reputation merely what others think you are." - John Wooden

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to