On Sat, 23 Feb 2008 19:01:19 -0500, Shmuel Metz (Seymour J.) <[EMAIL PROTECTED]> wrote:
>In <[EMAIL PROTECTED]>, on 02/23/2008 > at 10:07 AM, Walt Farrell <[EMAIL PROTECTED]> said: > >>One could argue that letting you determine your access to resources >>without actually trying to use them (and thus without causing audit >>records) is a form of hacking. > >Perhaps, but some IBM code does exactly that, and for what seems to be >good cause. I don't recall the details, but it was discussed here in the >last few years. > You may be thinking of ISPF 3.4 and data set name hiding or may be thinking of ISPF 3.4 checking for ALTER access to the catalog. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:[EMAIL PROTECTED] z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

