-------------------------------------<snip>------------------------------
It would be nice if someone actually documented a hole, instead of all
the urban legends we hear. Outside the magic SVC, or a trusted person
planting malware in an APF library, I don't know of any "holes". Please
share.
-------------------------------------<unsnip>----------------------------
Documenting a "hole" could be a seriously bad idea, since it might give
a potential troublemaker exactly the opening he's looking for.
In early versions of the IDMS SVC, there was an undocumented parm that
would place the caller in Supervisor state, Key-0. When we pointed this
out to CA, it was fixed in 48 hours.
Satisfied? :-)
Rick
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html