There is no need here to document the exact methods the OP used to
bypass restrictions and violate system integrity.  It's not hard to
figure out if you have much experience.

Given access to an APF-authorized library, one can do whatever one
wants, regardless of the "rules".

sas

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to