J R wrote:
You can of course code an SD37 abend and confuse everybody.
That's not something I would do.

A long, long time ago, a friend of mine protected our system by turning on all the password bits in SYS1 DSCBs (before RACF, etc.), without actually having passwords for them (and miscellaneous hooks in the system to permit normal running, and prevent addition of passwords). We also had a utility, used just before and after applying maintenance service, to toggle the bits on a volume basis. We also had a member of the systems group who repeatedly caused problems; e.g., he applied a PTF to the system even though it wasn't applicable (and we had to restore from backup). When he found out he no longer had access to the SYS1 data sets, he went to our boss and complained. Per direction, I provided documentation on how to run the utility to set/reset the password bits. However, whenever he ran, he got 122 & 222 (sans dump), 804, 80A, x37, E04, F03, and other weird abends. None of these would have happened if he had copied the sample JCL exactly as shown in the writeup!

Gerhard Postpischil
Bradford, VT

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to