In <[EMAIL PROTECTED]>, on 08/19/2006
at 03:14 PM, john gilmore <[EMAIL PROTECTED]> said:
>There are ways to do what you want to do. They would be APARable as
>z/OS security breaches if they werje described in sufficient detail
>to be usable.
I read his question as meaning that he's already authorized and just
wants to know how to build a DEB. If he wants to know how to get
authorized then I'll have to[1] refer him to his systems programmer.
>The presence of bank vaults in the world means that there must also
>be locksmiths in it who can open them, and I suppose that there is
>a similar rationale for the skills needed to breach z/OS,
There is no requirement for being able to breach MVS; if I find a way
to do so, I'll APAR it. If I work for a shop that wants me to provide
an authorized service then they'll grant me the appropriate
privileges.
[1] In the sense that If I know of a hole I'll disclose it only to
the relevant personnel.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html