-------------------------------------<snip>------------------------------
It would be nice if someone actually documented a hole, instead of all the urban legends we hear. Outside the magic SVC, or a trusted person planting malware in an APF library, I don't know of any "holes". Please share.
-------------------------------------<unsnip>----------------------------
Documenting a "hole" could be a seriously bad idea, since it might give a potential troublemaker exactly the opening he's looking for.

In early versions of the IDMS SVC, there was an undocumented parm that would place the caller in Supervisor state, Key-0. When we pointed this out to CA, it was fixed in 48 hours.

Satisfied?  :-)

Rick

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to