------------------------------------------<snip>-------------------------------------
Anyone running a program called EDVPARM? A consultant is trying to convince us to install this program to an authorized library with AC(1). Looking at the source concerns me. It appears that you can pass it a program name and parameter list and the program will ATTACHX it. This seems like a big hole to me. What if you pass it IRXJCL for example? Or?
----------------------------------------<unsnip>------------------------------------
I would have a VERY SERIOUS PROBLEM (Capitalized, quotated, underlined, in italics, in the middle of a blank page!) with installing a program of that nature. If your consultant requires the use of an authorized program, other than what the system provides, he/she needs to justify it, explain it and allow you to examine the source code so you can be sure he's telling you God's honest truth. Otherwise, he might very well compromise your system's integrity, corporate records, overall security, etc.

At this point, I'd be thinking really hard about whether his services are necessary and/or appropriate. He may be completely honest, but with a program like this floating around, I'd be really concerned. This consultant needs to prove to me that his motives are completely harmless AND that he's not going to share this program with those who might misuse it.

Can we say "HUMUNGOUSLY BIG RED FLAG" ???

--
Rick
--
Remember that if you’re not the lead dog, the view never changes.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to