>What if the ISPF user sets their primary and secondary LOG pages both to zero, 
>no log? 

IT is sometimes just the task of finding the correct wrench to drive in the 
proper nail.

Using the ISPF log as a security tool is such a task.

RACF can authenticate.
SMF can journal.


-
Too busy driving to stop for gas!  

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to