>First, I want to THANK YOU for clarification. Now it's more clear for me. >However both code - APF and SVC can be poor. Both can be invoked, APF >program can be invoked directly - it is still a risk it could accept >'magic parameters' and do something wrong. For example I imagine DSS >program clone which accept ADMIN keyword without further authorization.
>In other words - both kinds of code can be dangerous when poorly written >or contain 'backdoors'. While both, APF and SVC, can be poorely programmed, one difference is that you *can* control who can call APF-Code. You can't control who's calling an SVC. So in the latter case, you're completely dependent on the code to do the authorizaiton check right. Peter Hunkeler Credit Suisse ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

