In <[EMAIL PROTECTED]>, on 06/21/2007
   at 11:02 PM, "R.S." <[EMAIL PROTECTED]> said:

> From time to time I read on the list about companies which demand
>ISVs  to provide source code for SVC routines to analyze it from
>security  point of view.
>While I don't know to much about z/OS 'guts', I'm wondering what is
>the  reason for that?

Because there's a higher risk from them.

>Last, but not least - neither SVC, nor 'regular' APF-authorized
>program  can do anything illegal when not instructed, so unless ISV
>folks  unlimited access to prod system it is like dangerous knife in
>my safe.

Only if the safe is unlocked.

-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to