On 7/24/2012 9:16 AM, Paul Gilmartin wrote:
On Tue, 24 Jul 2012 10:05:00 +0300, Binyamin Dissen wrote:

:>Why have such a special list rather than merely verifying that the program
:>resides in an APF authorized library and was linked with AC=1?

Because a program expecting to be a job-step task may be spoofable, allocate
storage in a key where parallel tasks can update it, etc.

Sigh.  I keep forgetting (wishful thinking?) what a primitive OS z/OS is;
that it provides no simple way a program can protect its storage from
meddling by others.  z/OS still thinks it's running on a s/360.

-- gil



I'm not really much aware of non-IBM OS's, so I'm curious
as to what mechanism other OS's use to accomplish this. Can
you elucidate a little more?


--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-355-2752
http://www.trainersfriend.com

* To get a good Return on your Investment, first make an investment!
  + Training your people is an excellent investment

* Try our tool for calculating your Return On Investment
    for training dollars at
  http://www.trainersfriend.com/ROI/roi.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to