...  I have experimentally
built and tested simple GIMZIP-style archives outside SMP/E,
using conventional utilities not SAF-controlled, such as
IEBCOPY, IEBGENER, SHA-1, ...  By doing this and eschewing
GIMZIP do I gain security by eliminating the possibility that
I might inadvertently activate the ineffable security threat?
Or, since I am performing functions equivalent to GIMZIP's,
do I incur an equivalent risk?

Are you driving those utilities from a program that is APF authorized? If so, then you might be similarly exposed.

Kurt Quackenbush -- IBM, SMP/E Development

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to