On Sat, 23 Feb 2008 19:01:19 -0500, Shmuel Metz (Seymour J.)
<[EMAIL PROTECTED]> wrote:

>In <[EMAIL PROTECTED]>, on 02/23/2008
>   at 10:07 AM, Walt Farrell <[EMAIL PROTECTED]> said:
>
>>One could argue that letting you determine your access to resources
>>without actually trying to use them (and thus without causing audit
>>records) is a form of hacking.
>
>Perhaps, but some IBM code does exactly that, and for what seems to be
>good cause. I don't recall the details, but it was discussed here in the
>last few years.
>

You may be thinking of ISPF 3.4 and data set name hiding or may be
thinking of ISPF 3.4 checking for ALTER access to the catalog.

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:[EMAIL PROTECTED]
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to