On 1/6/2014 12:25 PM, Walt Farrell wrote:
While that's true for unauthorized programs, SDSF needs to runs authorized, and there's actually a fair amount of "special" stuff going on under the covers. Your more typical authorized program cannot interact with the user via ISPF services as SDSF does. It takes a lot of work (design and programming) to allow that while maintaining system integrity.
That "special stuff" is primarily mitigation of exposures in an old Field-Developed-Product (FDP) design that used a so-called "magic" SVC. Programs written today would likely not be designed that way.
-- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 http://www.phoenixsoftware.com/ ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN