... I have experimentally built and tested simple GIMZIP-style archives outside SMP/E, using conventional utilities not SAF-controlled, such as IEBCOPY, IEBGENER, SHA-1, ... By doing this and eschewing GIMZIP do I gain security by eliminating the possibility that I might inadvertently activate the ineffable security threat? Or, since I am performing functions equivalent to GIMZIP's, do I incur an equivalent risk?
Are you driving those utilities from a program that is APF authorized? If so, then you might be similarly exposed.
Kurt Quackenbush -- IBM, SMP/E Development ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

