On Tue, 15 Apr 2008 18:19:08 +0200 Lindy Mayfield <[EMAIL PROTECTED]> wrote:
:>For completeness, since I started this whole, ah, thing, I'm curious :>what they are. Here are the techniques I've learned so far, including :>the one that violates system integrity: :>__ The standard acceptable method is to call TSO/E Service Facility, :>IKJEFTSR and pass it the name of an authorized module. :>__ Call an SVC that flips the JSCBAUTH bit back on. This is :>non-standard. If it is to be implemented even on a development system :>then added security needs to be built in to make sure it isn't misused. :>__ Simply put all the authorized stuff into an SVC or PC routine. :>That's all I've collected so far. Are there more ways? DEBAPFIN SVC screening. -- Binyamin Dissen <[EMAIL PROTECTED]> http://www.dissensoftware.com Director, Dissen Software, Bar & Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html