>It also looks like ziip and zaap usage 
>may introduce security exposures

Usage of a zAAP or zIIP processor cannot conceivably introduce security 
exposures.

Changing code that was written unauthorized now to run in an authorized 
environment can. Such a change is not limited to conforming to zIIP 
requirements.

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to