On 10/25/2012 4:17 PM, Arthur T. wrote:
I infer from your desire not to be traced that you'd like to keep the actual code hidden from the users. Unless you've compiled your REXX code, all they need to do is look directly at the code. Even if that isn't the reason, if your code isn't compiled a user could copy it and remove any "don't interrupt" or "don't trace" within it.
Unless IBM has made changes recently, a compiled REXX program retains all the source. This is used to run at installations that don't license the compiler, but only the interpreter.
Gerhard Postpischil Bradford, VT ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
