J R wrote:
You can of course code an SD37 abend and confuse everybody.
That's not something I would do.
A long, long time ago, a friend of mine protected our system by turning
on all the password bits in SYS1 DSCBs (before RACF, etc.), without
actually having passwords for them (and miscellaneous hooks in the
system to permit normal running, and prevent addition of passwords). We
also had a utility, used just before and after applying maintenance
service, to toggle the bits on a volume basis. We also had a member of
the systems group who repeatedly caused problems; e.g., he applied a PTF
to the system even though it wasn't applicable (and we had to restore
from backup). When he found out he no longer had access to the SYS1 data
sets, he went to our boss and complained. Per direction, I provided
documentation on how to run the utility to set/reset the password bits.
However, whenever he ran, he got 122 & 222 (sans dump), 804, 80A, x37,
E04, F03, and other weird abends. None of these would have happened if
he had copied the sample JCL exactly as shown in the writeup!
Gerhard Postpischil
Bradford, VT
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html