Let me guess: you want to encrypt something and don't want to have to modify application programs.
My question is how you would control who is authorized to use your hook? And, of course, how do you plan to manage the keys and the changing thereof. -----Original Message----- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Rob Schramm Sent: Sunday, October 05, 2008 4:50 PM To: [email protected] Subject: Re: VSAM I/O Ulrich, I want to modify it before the original caller sees it. Additionally, if they update or write a new record.. I am looking to modify what gets written. I had considered the VSAM special processing exit, but I don't think it will do what I want. I had haven't contacted IBM yet. I thought I would digest suggestions from IBM-Main before continuing down this path. I am not looking for performance or security, just to be able to look at it .. then decide to modify it or not. Thanks, Rob ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

