>It also looks like ziip and zaap usage >may introduce security exposures
Usage of a zAAP or zIIP processor cannot conceivably introduce security exposures. Changing code that was written unauthorized now to run in an authorized environment can. Such a change is not limited to conforming to zIIP requirements. Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN