I guess for any of these approaches, the question becomes "how tight does
this have to be/how clever (or malicious) are your users?" I think there is
probably a tradeoff between how hard it is to do and maintain versus how
well it addresses the question in this paragraph.

We have not even mentioned the lightest weight approach, which might be
sufficient for the average user: just change the PROCs to execute your
program instead of the original target.

A solution that fully addresses the question above will require
modifications to LOAD, etc., etc., with all of the baggage that that
implies. 

Perhaps some combination of approaches would be the best: a front-end CSECT
for the programs you can re-link; some other approach for the programs you
cannot.

Charles

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Jon Renton
Sent: Monday, January 29, 2007 8:36 AM
To: [email protected]
Subject: AW: Getting control

Charles,

only problem with this approach is that the user can call the original
module ($A) directly and avoid my code. This would be a major loophole!

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to