On Mon, 11 Aug 2008 11:01:57 +0200 Itschak Mugzach <[EMAIL PROTECTED]> wrote:

:>malicious code = non normative code, a code that makes things not allowed or
:>planned intentionally or not.

If you can define what "normative" is, you can scan for the other.

:>Moving literals into record is suspected, not always a malicious code.

Why?

I do not understand your use of the term "malicious". You seem to be referring
to possible bugs.

:>On 8/11/08, Binyamin Dissen <[EMAIL PROTECTED]> wrote:

:>> On Mon, 11 Aug 2008 09:30:57 +0200 Itschak Mugzach <[EMAIL PROTECTED]>
:>> wrote:

:>> :>I know some products that checks program complexity, and even those who
:>> look
:>> :>into specific command usage. But this time I am looking for a product to
:>> :>analyse mainframe traditional language (Cobol, PLI, etc) for malicious
:>> code.
:>> :>I have some ideas like the usage of string command, Input that come
:>> outside
:>> :>a file record, etc.

:>> :>What are you using to analyse your code?

:>> Define "malicious code".

:>> Why is "input that come outside a file record" malicious?

--
Binyamin Dissen <[EMAIL PROTECTED]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to