>This runs afoul of IBM's practice of "security through obscurity"

That's not a practice or policy of which I am aware. Quite the opposite.

Peter Relson
z/OS Core Technology Design

Reply via email to