Pedro Vera wrote:
... alter the low core to get abend at low core reference .

Your question was not clear. Hopefully, you want to prevent people from using such a tool, or trying to figure out how it was done.

The way I read the question was that he was looking for a tool that would fail tasks trying to access (read or write) low storage. Such a tool would have been nice when I was running OS/PCP on a processor where it didn't support storage protection.

Some time ago I had a consulting gig where their product had received maintenance from "programmers" who should have been taken out and shot rather than given access to an editor. They committed things like MVC field,C'A' (rather than MVI or =C); I found those by writing a small exit routine that looked for low storage access (other than LA, LAE). While it doesn't catch execution errors where a base register has a small or zero value, it did find the bad instructions.

You need to protect the TESTAUTH command that is part of TSO.

Plus any number of other things.

I do not think you need a special tool. If you have access to APF dataset, you can easily write a program to do it. Your APF datasets should be protected. And if you are a hacker-wannabe, please ignore my advice.

COREZAP morphed into XACORZAP, etc. There are other things on the CBT resource.

Gerhard Postpischil
Bradford, VT

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to