Re: Mainframe ransomware solution

2021-10-10 Thread Peter Sylvester

On 08/10/2021 16:43, David Spiegel wrote:

Hi R'Shmuel; AMV"SH,
"... What about the Christmas Card Worm? ..."

That was AFAIK on a VM system, not, an MVS system.

Regards,
David


You could have "protected" the VM systems as much as you want, if a "friend" send you an 
exec/script/clist and you execute it.


the was actually created as small joke by a student at one of the EARN/BITNET nodes who did not see 
that it could escape from the site.


my old friend Helmut on the neighbour node detected "patient 0".

It rapidely entered vnet which was shutdown (to remove all copies afaik), earn bitnet was saved by 
Eric Thomas by filtering in rscs.


You had to execute it, a global social attack/joke, not like the other real 
worm in sendmail

Peter Sylvester

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe ransomware solution

2021-10-10 Thread PINION, RICHARD W.
The only thing I ever put on a system, similar to that, was a TSO program which 
produced a crude picture of the one finger salute.  You could put whatever 
message you wanted on the hand.  Silly me, I had the program executing at TSO 
logon.  Management was not amused.  

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Peter Sylvester
Sent: Sunday, October 10, 2021 9:36 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe ransomware solution

[External Email. Exercise caution when clicking links or opening attachments.]

On 08/10/2021 16:43, David Spiegel wrote:
> Hi R'Shmuel; AMV"SH,
> "... What about the Christmas Card Worm? ..."
>
> That was AFAIK on a VM system, not, an MVS system.
>
> Regards,
> David
>
>
You could have "protected" the VM systems as much as you want, if a "friend" 
send you an exec/script/clist and you execute it.

the was actually created as small joke by a student at one of the EARN/BITNET 
nodes who did not see that it could escape from the site.

my old friend Helmut on the neighbour node detected "patient 0".

It rapidely entered vnet which was shutdown (to remove all copies afaik), earn 
bitnet was saved by Eric Thomas by filtering in rscs.

You had to execute it, a global social attack/joke, not like the other real 
worm in sendmail

Peter Sylvester

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Confidentiality notice: 
This e-mail message, including any attachments, may contain legally privileged 
and/or confidential information. If you are not the intended recipient(s), or 
the employee or agent responsible for delivery of this message to the intended 
recipient(s), you are hereby notified that any dissemination, distribution, or 
copying of this e-mail message is strictly prohibited. If you have received 
this message in error, please immediately notify the sender and delete this 
e-mail message from your computer.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe ransomware solution

2021-10-10 Thread Seymour J Metz
My ILRBIRS only had the picture, no text.

My favorite prank is the Cookie Monster written at MIT for Multics: 
..


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
PINION, RICHARD W. [rpin...@firsthorizon.com]
Sent: Sunday, October 10, 2021 10:52 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe ransomware solution

The only thing I ever put on a system, similar to that, was a TSO program which 
produced a crude picture of the one finger salute.  You could put whatever 
message you wanted on the hand.  Silly me, I had the program executing at TSO 
logon.  Management was not amused.

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Peter Sylvester
Sent: Sunday, October 10, 2021 9:36 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe ransomware solution

[External Email. Exercise caution when clicking links or opening attachments.]

On 08/10/2021 16:43, David Spiegel wrote:
> Hi R'Shmuel; AMV"SH,
> "... What about the Christmas Card Worm? ..."
>
> That was AFAIK on a VM system, not, an MVS system.
>
> Regards,
> David
>
>
You could have "protected" the VM systems as much as you want, if a "friend" 
send you an exec/script/clist and you execute it.

the was actually created as small joke by a student at one of the EARN/BITNET 
nodes who did not see that it could escape from the site.

my old friend Helmut on the neighbour node detected "patient 0".

It rapidely entered vnet which was shutdown (to remove all copies afaik), earn 
bitnet was saved by Eric Thomas by filtering in rscs.

You had to execute it, a global social attack/joke, not like the other real 
worm in sendmail

Peter Sylvester

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Confidentiality notice:
This e-mail message, including any attachments, may contain legally privileged 
and/or confidential information. If you are not the intended recipient(s), or 
the employee or agent responsible for delivery of this message to the intended 
recipient(s), you are hereby notified that any dissemination, distribution, or 
copying of this e-mail message is strictly prohibited. If you have received 
this message in error, please immediately notify the sender and delete this 
e-mail message from your computer.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe ransomware solution

2021-10-10 Thread CM Poncelet
This reminds me of someone at a Company I worked for, can't remember
which, where some programmer had displayed a prompt for whatever to
which an end-user replied "f*@k" - upon which the program then replied,
"Your place or mine?" Needless to say, management was not amused by this
and the programmer was given a "good talking to" if not then also put on
"garden leave". 
 
 

On 10/10/2021 15:52, PINION, RICHARD W. wrote:
> The only thing I ever put on a system, similar to that, was a TSO program 
> which produced a crude picture of the one finger salute.  You could put 
> whatever message you wanted on the hand.  Silly me, I had the program 
> executing at TSO logon.  Management was not amused.  
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf Of 
> Peter Sylvester
> Sent: Sunday, October 10, 2021 9:36 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Mainframe ransomware solution
>
> [External Email. Exercise caution when clicking links or opening attachments.]
>
> On 08/10/2021 16:43, David Spiegel wrote:
>> Hi R'Shmuel; AMV"SH,
>> "... What about the Christmas Card Worm? ..."
>>
>> That was AFAIK on a VM system, not, an MVS system.
>>
>> Regards,
>> David
>>
>>
> You could have "protected" the VM systems as much as you want, if a "friend" 
> send you an exec/script/clist and you execute it.
>
> the was actually created as small joke by a student at one of the EARN/BITNET 
> nodes who did not see that it could escape from the site.
>
> my old friend Helmut on the neighbour node detected "patient 0".
>
> It rapidely entered vnet which was shutdown (to remove all copies afaik), 
> earn bitnet was saved by Eric Thomas by filtering in rscs.
>
> You had to execute it, a global social attack/joke, not like the other real 
> worm in sendmail
>
> Peter Sylvester
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> Confidentiality notice: 
> This e-mail message, including any attachments, may contain legally 
> privileged and/or confidential information. If you are not the intended 
> recipient(s), or the employee or agent responsible for delivery of this 
> message to the intended recipient(s), you are hereby notified that any 
> dissemination, distribution, or copying of this e-mail message is strictly 
> prohibited. If you have received this message in error, please immediately 
> notify the sender and delete this e-mail message from your computer.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> .
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN