Re: Query - do you have access to GitHub from your z/OS system? And do you have git on your z/OS system?

2024-02-15 Thread Paul Gilmartin
On Thu, 15 Feb 2024 09:09:04 +, Rob Scott  wrote:

>We use git on z/OS extensively throughout the company and it is one of those 
>tools where you end up thinking "how on earth did I function effectively 
>without it?".
> 
ISPF/LMF?

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: How read Cyl 0 from within a program?

2024-02-15 Thread Charles Mills
Thanks. You all have been very helpful. I think the approach is to look at one 
or more of the suggested CBT programs and see what they do. I suspect I can 
take it from there.

> I have assembly source code for 3card loader.  Would that help?  

I don't think so but let me keep that in mind. Thank you.

Charles

On Tue, 13 Feb 2024 12:19:46 -0600, Charles Mills  wrote:

>I am interested in writing a program to read the IPL records from a DASD 
>volume. (Read only, not update). I am comfortable with XDAP but how do I OPEN 
>a "dataset" that would include cylinder 0?
>
>APF, OPERATIONS and so forth are not out of the question.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DFSORT JOINKEYS problem

2024-02-15 Thread Sri h Kolusu
>> I am really interested in your job that generates the DFSORT symbols for all 
>> IRRADU00 & IRRDBU00 record types Regards Jack

Jack,

I have sent an offline email with the PDS that contains the JCL in XMIT format 
to your personal id (gmail).

Thanks,
Kolusu

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: How read Cyl 0 from within a program?

2024-02-15 Thread Lindy Mayfield
I have assembly source code for 3card loader.  Would that help?  

Kind regards,
Lindy

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Charles Mills
Sent: Tuesday, February 13, 2024 8:20 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: How read Cyl 0 from within a program?

EXTERNAL

I am interested in writing a program to read the IPL records from a DASD 
volume. (Read only, not update). I am comfortable with XDAP but how do I OPEN a 
"dataset" that would include cylinder 0?

APF, OPERATIONS and so forth are not out of the question.

Thanks,
Charles

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security -- When broken how far it may reach.....

2024-02-15 Thread Dave Beagle
I’ve had around a dozen credit cards compromised in the last 20 years. A minor 
inconvenience mostly. Just contact the company and they close the current 
account and open a new one for you. You’re not on the hook for anything. I’ve 
had email accounts stolen via a number of hacks. Target, PayPal, Ebay, others. 
Sometimes I close the account, sometimes change the password. My important 
accounts have strong passwords and email accounts that are rarely used. My 
investment account is accessed by an email account only used for that account 
with a super strong password which I change every few months. Same for my bank 
account.

Let me ask, how many of you use password as the password on your HMC? I know 
most of the shops I worked at did.


Sent from Yahoo Mail for iPhone


On Thursday, February 15, 2024, 11:40 AM, rpinion865 
<042a019916dd-dmarc-requ...@listserv.ua.edu> wrote:

Regarding the OPM incident.  I received a letter stating that my information 
had been accessed.  I have never worked for the federal government, nor have I 
ever applied for a job with the federal government.  I contacted the OPM to 
find out why they would have my information.  After several weeks, I received a 
letter stating that they could not locate anything pertaining to me.  Next, I 
asked my US representative to look into the matter.  The US representative's 
office received the same reply that I did.  So, did they have my information or 
not???




Sent with Proton Mail secure email.

On Thursday, February 15th, 2024 at 11:32 AM, Steve Thompson  
wrote:

> Reading the articles, I find a similar thing that is done: Paying
> for a year of ID theft insurance or some such.
> 
> Here is the situation for those of us that were part of the OPM
> cracking from 2015:
> 
> Random attempts to open bank accounts by bad actors in our name
> (which ever one of us it happens/ed to be)
> 
> Random attempts to open credit accounts by bad actors in our name
> (which ever one it happens to).
> 
> So OPM did the one year thing to find out that it would have to
> become permanent. So I get regular notices of attempts to open an
> account. One person I personally know who was in law enforcement
> and worked with Secret Service and Home land security is
> constantly having problems like this.
> 
> My point is, once this has happened, you never know when you are
> going to get hit and from what direction. And so these guys think
> that 1 year of such "protection" is going to help.
> 
> And for those of you who own property, you might want to make
> sure that you get notified if there is any activity, such as a
> lien for some credit thing, or even a quit claim deed being
> filed. You might have your property sold out from under you.
> 
> Just say'n'.
> 
> BTW -- that OPM crack included data on people that were not
> getting clearances, but had to be talked with about the person
> applying for the clearance(s). So this even included foreign
> nationals that one is related to!!
> 
> So depending on the entity that is cracked, the information gets
> into the dark web and it may include people that didn't even know
> they had anything to do with the entity that got cracked.
> 
> Security on mainframes (and others) sometimes has a greater reach
> when cracked than we realize.
> 
> Steve Thompson
> 
> On 2/15/2024 10:54 AM, P H wrote:
> 
> > Passwords and hackers. Is there anything safe?
> > 
> > https://eandt.theiet.org/2024/02/15/southern-water-admits-data-breach-may-impact-nearly-half-million-customers?utm_source=related-content-bullet-list
> > 
> > https://eandt.theiet.org/2024/02/15/state-sponsored-hackers-using-ai-cyber-attacks-microsoft-warns?utm_campaign=E%2BT
> >  News - Template Redesign 15 Feb (Split test)_content=E%26T News - 
> > Members_medium=email_source=Adestra_term=865089
> > 
> > Sent from Outlook for Androidhttps://aka.ms/AAb9ysg
> > 
> > From: IBM Mainframe Discussion List IBM-MAIN@LISTSERV.UA.EDU on behalf of 
> > Jack Zukt 059cd493dd41-dmarc-requ...@listserv.ua.edu
> > Sent: Thursday, February 15, 2024 3:25:18 PM
> > To: IBM-MAIN@LISTSERV.UA.EDU IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: Insecure security - was SDSF PS Command column
> > 
> > Hi Bill,
> > I can relate to your suspicions about password managers. Not to long ago
> > Lastpass found out that they have been hacked, which must have been a big
> > problem for its end users (which, fortunately I am not). On the other hand,
> > I have way too many passwords to be manageable without a password manager.
> > So, I use not one, but two. With different master passwords. And using a
> > password manager will not prevent you from sharing passwords with trusted
> > friends. I usually tell my colleagues that use excel or notepad to keep
> > their passwords to try and use keepass. It is as easy to use as those
> > methods but far for secure.
> > Regards
> > Jack
> 
> 
> --
> 

Re: Insecure security - was SDSF PS Command column

2024-02-15 Thread Joel C. Ewing
The nature of the LastPass hack would not have been a serious problem to 
those using a good enough master passwords for LastPass access.  If 
concerned that your database might have been stolen and you didn't trust 
the goodness of your encryption password, you could change to a better 
master password, and then first change to new good passwords on those 
accounts that are most sensitive (financial stuff, email accounts used 
as account usernames or for account recovery, etc.), and gradually 
change passwords on accounts of lesser importance.   Even if your 
password-manager data was captured in the hack, it should take some time 
to hack a decent encryption password (plus many financial accounts now 
use MFA), giving time to alter your main encryption password and then 
change the passwords of sensitive accounts.   The hackers would 
initially be diverted by exploiting the inevitable cases where people 
had used grossly poor passwords for LastPass  encryption, and they might 
even stop after that -- the longer it takes to hack a stolen encrypted 
password database, the more likely the data will have become obsolete.


My personal preference for password manager is KeePassXC (same database 
format but more actively maintained than KeePass and KeePassX), as it 
uses a local file rather than relying on a known cloud service that 
concentrates everybody's encrypted data in one spot,  an attractive 
target for hackers.    If you want, you can store copies of your 
encrypted KeePassXC database in a generic cloud service, even under 
non-obvious file names making it doubly hard for any hacker to stumble 
across.  It is trivial to make copies of the encrypted database file 
that may be stored on external media and placed in bank boxes as 
backups, or as a way to pass your passwords to your estate or a trusted 
family member. You have complete control over the database.  I 
especially like the ability of KeePassXC to concurrently access multiple 
password databases.   If you belong to an organization and have 
responsibility for organizational passwords, you can isolate those to an 
organizational KeePass database encrypted by a different password and 
easily convey those securely to following officers, without having to 
mix them with your personal passwords.


I dislike websites that insist on special characters in a password.  
Acceptable special characters can vary among websites and special 
characters are not necessary  for a good password or a good username.  
Using password-manager-generated passwords, you can always get the same 
level of security without requiring special characters by just including 
a few more random characters.


Physical notebooks if properly secured can maintain passwords securely, 
but have their own problems.  What if some event destroys your notebook 
and you have no up-to-date backup copy in another secure location?   Or 
if you can't find your notebook, don't know if it has fallen into the 
wrong hands, and can't even access your own accounts to change your 
account passwords when the passwords are possibly compromised?


    JC Ewing

On 2/15/24 09:25, Jack Zukt wrote:

Hi Bill,
I can relate to your suspicions about password managers. Not to long ago
Lastpass found out that they have been hacked, which must have been a big
problem for its end users (which, fortunately I am not). On the other hand,
I have way too many passwords to be manageable without a password manager.
So, I use not one, but two. With different master passwords. And using a
password manager will not prevent you from sharing passwords with trusted
friends. I usually tell my colleagues that use excel or notepad to keep
their passwords to try and use keepass. It is as easy to use as those
methods but far for secure.
Regards
Jack


On Thu, 15 Feb 2024 at 14:01, billogden  wrote:


My trivial comments:

1. Using a password manager seems to be putting all our eggs in one basket.
What if that basket fails? Is it secure? Can I always access it? If we need
to make a particular password available to a "trusted" friend (at some
indefinite time), how should we manage that.
2. I have about 60+ passwords noted (on a paper, not in view of any camera)
for various sites. Some have not been used in years, some are used
frequently. I rather expect than very few of us (on this site) have a tiny
number of passwords that can manage everything we need to do.
3. Minimum 16 characters, upper & lower case, numbers, symbols --- this can
be very obscure to all the "computer uneducated" people that try to use the
many services available via the web. We are expected to remember these?
Many
PWs are needed to avoid using the same PW for too many purposes.
4. Like most of us (on this site) I place tape over the camera lenses on
all
my systems.
5. Github? Being old and stupid, I have not used it yet. On my z/OS systems
(that often run odd versions of z/OS, etc, etc) I really do not want to
depend on a web service for program source code, 

Re: DFSORT JOINKEYS problem

2024-02-15 Thread Jack Zukt
Hi Massimo & Kolusu,

Thank you both for your answers.
As Massimo noticed, the first SKIP was wrong. There is no space between the
RDW and the record subtype; there are only spaces between columns. My bad.
Kolusu, thank you for the improved JCL. And I will take you on your offer.
I am really interested in your job that generates the DFSORT symbols for
all IRRADU00 & IRRDBU00 record types
Regards
Jack


On Thu, 15 Feb 2024 at 16:23, Sri h Kolusu  wrote:

> Jack,
>
> Since I don't have the joblog, I cannot verify that the input files are VB
> or FB as your symbols xtyp and xusr are looking at positions 1 and 6 which
> would be incorrect for VB files.
>
> Either way here is a modified/optimized version which would give you the
> desired results (You don't evenhave to filter the type records before as
> the job below reads the output of IRRDBU00 directly)
>
> PS: I have a job that generates the DFSORT symbols for all IRRADU00 &
> IRRDBU00 record types.  Let me know if you are interested.
>
> //SET#HLQS SET HLQS=
> //*
> //SORT001  EXEC PGM=SORT
> //SYSOUT   DD  SYSOUT=*
> //SYMNAMES DD  *
> TYPE0200_RDW,1,4,BI
> USBD_RECORD_TYPE,*,4,CH
> DLM,*,1,CH
> USBD_NAME,*,8,CH
> USBD_PROGRAMMER,79,20,CH
> USBD_DEFGRP_ID,100,8,CH
> USBD_LASTJOB_DATE,118,10,CH
> TYPE0220_RDW,1,4,BI
> USTSO_RECORD_TYPE,*,4,CH
> SKIP,1
> USTSO_NAME,*,8,CH
> /*
> //IN1  DD DISP=SHR,DSN=
> //IN2  DD DISP=SHR,DSN=
> //SORTOUT  DD SYSOUT=*
> //SYSINDD *
>   OPTION COPY
>   JOINKEYS F1=IN1,FIELDS=(USTSO_NAME,A),SORTED,NOSEQCK
>   JOINKEYS F2=IN2,FIELDS=(USBD_NAME,A),SORTED,NOSEQCK
>
>   REFORMAT FIELDS=(F1:USBD_NAME,
>   DLM,
>   USBD_PROGRAMMER,
>   DLM,
>   USBD_LASTJOB_DATE,
>   DLM,
>   USBD_DEFGRP_ID)
> /*
> //JNF1CNTL DD *
>   INCLUDE COND=(USBD_RECORD_TYPE,EQ,C'0200')
> /*
> //JNF2CNTL DD *
>   INCLUDE COND=(USTSO_RECORD_TYPE,EQ,C'0220')
> /*
>
> Thanks,
> Kolusu
> DFSORT Development
> IBM Corporation
>
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


unfamiliar OIA symbol I can't find documented

2024-02-15 Thread Pommier, Rex
Hello list,

I got a trouble ticket this morning about a couple people having issues with 
their 3270 session locking up on them in a CICS screen and their not being able 
to unlock the session, resulting in their needing to shut down their 3270 
emulator and restart it.  The screen shot I got shows an unfamiliar OIA symbol 
and I'd like some help with it if somebody knows what it means.  Looks to be 
starting in column 9 of the OIA.  The first symbol looks like a vertically 
elongated plus sign, then a blank, and then a pair of 16th music notes followed 
by what I can best describe as the outline of the sun.  We're using Passport 
web-2-host and I am finding nothing describing these in the W2H manual.  Any 
description of what these mean would be much appreciated.  

TIA,

Rex



--
The information contained in this message is confidential, protected from 
disclosure and may be legally privileged. If the reader of this message is not 
the intended recipient or an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that any disclosure, 
distribution, copying, or any action taken or action omitted in reliance on it, 
is strictly prohibited and may be unlawful. If you have received this 
communication in error, please notify us immediately by replying to this 
message and destroy the material in its entirety, whether in electronic or hard 
copy format. Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: z/OS hosting

2024-02-15 Thread Gibney, Dave
I did a lift'n'shift to FNTS in Omaha several years ago, It was very 
successful. Ran there 5 years and then did shutdown z/OS

> -Original Message-
> From: IBM Mainframe Discussion List  On
> Behalf Of Gadi Ben-Avi
> Sent: Thursday, February 15, 2024 2:40 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: z/OS hosting
> 
> [EXTERNAL EMAIL]
> 
> Hi,
> I was asked to investigate z/OS hosting.
> Can any one point me to companies that provides this type of service?
> If you've move from on premis to a hosted environment, and would like to
> share your experience, I would like to hear it.
> 
> Thanks
> 
> Gadi
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: z/OS hosting

2024-02-15 Thread esst...@juno.com
   You should look at a company called Maintec

-- Original Message --
From: Gadi Ben-Avi 
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: z/OS hosting
Date: Thu, 15 Feb 2024 10:39:56 +

Hi,
I was asked to investigate z/OS hosting.
Can any one point me to companies that provides this type of service?
If you've move from on premis to a hosted environment, and would like to share 
your experience, I would like to hear it.

Thanks

Gadi

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security -- When broken how far it may reach.....

2024-02-15 Thread rpinion865
Regarding the OPM incident.  I received a letter stating that my information 
had been accessed.  I have never worked for the federal government, nor have I 
ever applied for a job with the federal government.  I contacted the OPM to 
find out why they would have my information.  After several weeks, I received a 
letter stating that they could not locate anything pertaining to me.  Next, I 
asked my US representative to look into the matter.  The US representative's 
office received the same reply that I did.  So, did they have my information or 
not???




Sent with Proton Mail secure email.

On Thursday, February 15th, 2024 at 11:32 AM, Steve Thompson  
wrote:

> Reading the articles, I find a similar thing that is done: Paying
> for a year of ID theft insurance or some such.
> 
> Here is the situation for those of us that were part of the OPM
> cracking from 2015:
> 
> Random attempts to open bank accounts by bad actors in our name
> (which ever one of us it happens/ed to be)
> 
> Random attempts to open credit accounts by bad actors in our name
> (which ever one it happens to).
> 
> So OPM did the one year thing to find out that it would have to
> become permanent. So I get regular notices of attempts to open an
> account. One person I personally know who was in law enforcement
> and worked with Secret Service and Home land security is
> constantly having problems like this.
> 
> My point is, once this has happened, you never know when you are
> going to get hit and from what direction. And so these guys think
> that 1 year of such "protection" is going to help.
> 
> And for those of you who own property, you might want to make
> sure that you get notified if there is any activity, such as a
> lien for some credit thing, or even a quit claim deed being
> filed. You might have your property sold out from under you.
> 
> Just say'n'.
> 
> BTW -- that OPM crack included data on people that were not
> getting clearances, but had to be talked with about the person
> applying for the clearance(s). So this even included foreign
> nationals that one is related to!!
> 
> So depending on the entity that is cracked, the information gets
> into the dark web and it may include people that didn't even know
> they had anything to do with the entity that got cracked.
> 
> Security on mainframes (and others) sometimes has a greater reach
> when cracked than we realize.
> 
> Steve Thompson
> 
> On 2/15/2024 10:54 AM, P H wrote:
> 
> > Passwords and hackers. Is there anything safe?
> > 
> > https://eandt.theiet.org/2024/02/15/southern-water-admits-data-breach-may-impact-nearly-half-million-customers?utm_source=related-content-bullet-list
> > 
> > https://eandt.theiet.org/2024/02/15/state-sponsored-hackers-using-ai-cyber-attacks-microsoft-warns?utm_campaign=E%2BT
> >  News - Template Redesign 15 Feb (Split test)_content=E%26T News - 
> > Members_medium=email_source=Adestra_term=865089
> > 
> > Sent from Outlook for Androidhttps://aka.ms/AAb9ysg
> > 
> > From: IBM Mainframe Discussion List IBM-MAIN@LISTSERV.UA.EDU on behalf of 
> > Jack Zukt 059cd493dd41-dmarc-requ...@listserv.ua.edu
> > Sent: Thursday, February 15, 2024 3:25:18 PM
> > To: IBM-MAIN@LISTSERV.UA.EDU IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: Insecure security - was SDSF PS Command column
> > 
> > Hi Bill,
> > I can relate to your suspicions about password managers. Not to long ago
> > Lastpass found out that they have been hacked, which must have been a big
> > problem for its end users (which, fortunately I am not). On the other hand,
> > I have way too many passwords to be manageable without a password manager.
> > So, I use not one, but two. With different master passwords. And using a
> > password manager will not prevent you from sharing passwords with trusted
> > friends. I usually tell my colleagues that use excel or notepad to keep
> > their passwords to try and use keepass. It is as easy to use as those
> > methods but far for secure.
> > Regards
> > Jack
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security -- When broken how far it may reach.....

2024-02-15 Thread Steve Thompson
Reading the articles, I find a similar thing that is done: Paying 
for a year of ID theft insurance or some such.


Here is the situation for those of us that were part of the OPM 
cracking from 2015:


Random attempts to open bank accounts by bad actors in our name 
(which ever one of us it happens/ed to be)


Random attempts to open credit accounts by bad actors in our name 
(which ever one it happens to).


So OPM did the one year thing to find out that it would have to 
become permanent. So I get regular notices of attempts to open an 
account. One person I personally know who was in law enforcement 
and worked with Secret Service and Home land security is 
constantly having problems like this.


My point is, once this has happened, you never know when you are 
going to get hit and from what direction. And so these guys think 
that 1 year of such "protection" is going to help.


And for those of you who own property, you might want to make 
sure that you get notified if there is any activity, such as a 
lien for some credit thing, or even a quit claim deed being 
filed. You might have your property sold out from under you.


Just say'n'.

BTW -- that OPM crack included data on people that were not 
getting clearances, but had to be  talked with about the person 
applying for the clearance(s). So this even included foreign 
nationals that one is related to!!


So depending on the entity that is cracked, the information gets 
into the dark web and it may include people that didn't even know 
they had anything to do with the entity that got cracked.


Security on mainframes (and others) sometimes has a greater reach 
when cracked than we realize.


Steve Thompson

On 2/15/2024 10:54 AM, P H wrote:

Passwords and hackers. Is there anything safe?

https://eandt.theiet.org/2024/02/15/southern-water-admits-data-breach-may-impact-nearly-half-million-customers?utm_source=related-content-bullet-list

https://eandt.theiet.org/2024/02/15/state-sponsored-hackers-using-ai-cyber-attacks-microsoft-warns?utm_campaign=E%2BT%20News%20-%20Template%20Redesign%2015%20Feb%20%28Split%20test%29_content=E%26T%20News%20-%20Members_medium=email_source=Adestra_term=865089


Sent from Outlook for Android

From: IBM Mainframe Discussion List  on behalf of Jack Zukt 
<059cd493dd41-dmarc-requ...@listserv.ua.edu>
Sent: Thursday, February 15, 2024 3:25:18 PM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Insecure security - was SDSF PS Command column

Hi Bill,
I can relate to your suspicions about password managers. Not to long ago
Lastpass found out that they have been hacked, which must have been a big
problem for its end users (which, fortunately I am not). On the other hand,
I have way too many passwords to be manageable without a password manager.
So, I use not one, but two. With different master passwords. And using a
password manager will not prevent you from sharing passwords with trusted
friends. I usually tell my colleagues that use excel or notepad to keep
their passwords to try and use keepass. It is as easy to use as those
methods but far for secure.
Regards
Jack




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DFSORT JOINKEYS problem

2024-02-15 Thread Sri h Kolusu
Jack,

Since I don't have the joblog, I cannot verify that the input files are VB or 
FB as your symbols xtyp and xusr are looking at positions 1 and 6 which would 
be incorrect for VB files.

Either way here is a modified/optimized version which would give you the 
desired results (You don't evenhave to filter the type records before as the 
job below reads the output of IRRDBU00 directly)

PS: I have a job that generates the DFSORT symbols for all IRRADU00 & IRRDBU00 
record types.  Let me know if you are interested.

//SET#HLQS SET HLQS=
//*
//SORT001  EXEC PGM=SORT
//SYSOUT   DD  SYSOUT=*
//SYMNAMES DD  *
TYPE0200_RDW,1,4,BI
USBD_RECORD_TYPE,*,4,CH
DLM,*,1,CH
USBD_NAME,*,8,CH
USBD_PROGRAMMER,79,20,CH
USBD_DEFGRP_ID,100,8,CH
USBD_LASTJOB_DATE,118,10,CH
TYPE0220_RDW,1,4,BI
USTSO_RECORD_TYPE,*,4,CH
SKIP,1
USTSO_NAME,*,8,CH
/*
//IN1  DD DISP=SHR,DSN=
//IN2  DD DISP=SHR,DSN=
//SORTOUT  DD SYSOUT=*
//SYSINDD *
  OPTION COPY
  JOINKEYS F1=IN1,FIELDS=(USTSO_NAME,A),SORTED,NOSEQCK
  JOINKEYS F2=IN2,FIELDS=(USBD_NAME,A),SORTED,NOSEQCK

  REFORMAT FIELDS=(F1:USBD_NAME,
  DLM,
  USBD_PROGRAMMER,
  DLM,
  USBD_LASTJOB_DATE,
  DLM,
  USBD_DEFGRP_ID)
/*
//JNF1CNTL DD *
  INCLUDE COND=(USBD_RECORD_TYPE,EQ,C'0200')
/*
//JNF2CNTL DD *
  INCLUDE COND=(USTSO_RECORD_TYPE,EQ,C'0220')
/*

Thanks,
Kolusu
DFSORT Development
IBM Corporation



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DFSORT JOINKEYS problem

2024-02-15 Thread Massimo Biancucci
Jack,

I don't know the exact format of the two files.
Did you check (I mean by eyes) the field position are ok ?
Is the first SKIP correct ?

Best regard.
Max


Il giorno gio 15 feb 2024 alle ore 16:35 Jack Zukt <
059cd493dd41-dmarc-requ...@listserv.ua.edu> ha scritto:

> Hi all,
>
> I have two files created using IRRDBU00. One has type 220 records, TSO
> segments, the other one has type 200 records, base userid information.
> For the userids on the 220 type records, I want to get from the 200 type
> records the userid, user name; last logon date; default group left four
> characters.
> Unfortunately all that I am getting is an empty file.
> This is the JCL that I am using:
>
> //*
> //SET#HLQ  SET HLQ=
> //SET#HLQS SET HLQS=
> //*
> //APAGA01  EXEC PGM=IEFBR14
> //SORTOUT  DD  DSN=#01701.TXT,
> // DISP=(MOD,DELETE),SPACE=(TRK,(1))
> //*
> //SORT001  EXEC PGM=SORT
> //SYSOUT   DD  SYSOUT=*
> //SYMNAMES DD  *
> XRDW,1,04,ZD
> SKIP,1
> XTYP,1,04,ZD
> SKIP,1
> XUSR,*,08,CH
> NAME,75,20,CH
> SKIP,1
> GRP4,*,04,CH
> SKIP,1
> LDAT,114,10,CH
> *
> /*
> //IN1  DD  DISP=SHR,DSN=
> //IN2  DD  DISP=SHR,DSN=
> //OUT01DD  DSN=#01701.TXT,
> // DISP=(NEW,CATLG),
> // RECFM=FB,LRECL=45,
> // SPACE=(TRK,(15,15),RLSE)
> //SYSINDD  *
>   OPTION COPY
>   JOINKEYS F1=IN1,FIELDS=(XUSR,A),SORTED,NOSEQCK
>   JOINKEYS F2=IN2,FIELDS=(XUSR,A),SORTED,NOSEQCK
>   REFORMAT FIELDS=(F2:5,140)
>   OUTFIL FNAMES=OUT01,
>  BUILD=(1:XUSR,* 08
>   X,   * 01
>   NAME,* 20
>   X,   * 01
>   LDAT,* 10
>   X,   * 01
>   GRP4)* 04
> /*
> //*
>
> What is it that I am doing wrong?
> Regards
> Jack
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security

2024-02-15 Thread P H
Passwords and hackers. Is there anything safe?

https://eandt.theiet.org/2024/02/15/southern-water-admits-data-breach-may-impact-nearly-half-million-customers?utm_source=related-content-bullet-list

https://eandt.theiet.org/2024/02/15/state-sponsored-hackers-using-ai-cyber-attacks-microsoft-warns?utm_campaign=E%2BT%20News%20-%20Template%20Redesign%2015%20Feb%20%28Split%20test%29_content=E%26T%20News%20-%20Members_medium=email_source=Adestra_term=865089


Sent from Outlook for Android

From: IBM Mainframe Discussion List  on behalf of 
Jack Zukt <059cd493dd41-dmarc-requ...@listserv.ua.edu>
Sent: Thursday, February 15, 2024 3:25:18 PM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Insecure security - was SDSF PS Command column

Hi Bill,
I can relate to your suspicions about password managers. Not to long ago
Lastpass found out that they have been hacked, which must have been a big
problem for its end users (which, fortunately I am not). On the other hand,
I have way too many passwords to be manageable without a password manager.
So, I use not one, but two. With different master passwords. And using a
password manager will not prevent you from sharing passwords with trusted
friends. I usually tell my colleagues that use excel or notepad to keep
their passwords to try and use keepass. It is as easy to use as those
methods but far for secure.
Regards
Jack


On Thu, 15 Feb 2024 at 14:01, billogden  wrote:

> My trivial comments:
>
> 1. Using a password manager seems to be putting all our eggs in one basket.
> What if that basket fails? Is it secure? Can I always access it? If we need
> to make a particular password available to a "trusted" friend (at some
> indefinite time), how should we manage that.
> 2. I have about 60+ passwords noted (on a paper, not in view of any camera)
> for various sites. Some have not been used in years, some are used
> frequently. I rather expect than very few of us (on this site) have a tiny
> number of passwords that can manage everything we need to do.
> 3. Minimum 16 characters, upper & lower case, numbers, symbols --- this can
> be very obscure to all the "computer uneducated" people that try to use the
> many services available via the web. We are expected to remember these?
> Many
> PWs are needed to avoid using the same PW for too many purposes.
> 4. Like most of us (on this site) I place tape over the camera lenses on
> all
> my systems.
> 5. Github? Being old and stupid, I have not used it yet. On my z/OS systems
> (that often run odd versions of z/OS, etc, etc) I really do not want to
> depend on a web service for program source code, etc, etc. A nice SMALL
> book
> that covers the most basic, practical uses of github (for a gethub
> beginner)
> without going into all the really wonderful things that might be done with
> it, would be handy. To me, a basic book would illustrate the specific web
> commands, the specific z/OS JCL, the specific TSO actions to install and
> perform basic operations in a simple/practical manner.
> 6. Too much obscure/difficult security == insecurity?  Amen, Amen, Amen.
> The
> IT executives seem to be in a terrific rush to go down this path. (Also,
> "too much security" seems to actually diminish the time available to
> create/improve application code, etc.)
> 7. "Trusted" (in the meanings used on this site) can be a very very complex
> concept!
>
> Bill Ogden
> z/OS old, old time z/OS person (started on OS/360 option 1), but still
> active (to some extent)!
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


DFSORT JOINKEYS problem

2024-02-15 Thread Jack Zukt
Hi all,

I have two files created using IRRDBU00. One has type 220 records, TSO
segments, the other one has type 200 records, base userid information.
For the userids on the 220 type records, I want to get from the 200 type
records the userid, user name; last logon date; default group left four
characters.
Unfortunately all that I am getting is an empty file.
This is the JCL that I am using:

//*
//SET#HLQ  SET HLQ=
//SET#HLQS SET HLQS=
//*
//APAGA01  EXEC PGM=IEFBR14
//SORTOUT  DD  DSN=#01701.TXT,
// DISP=(MOD,DELETE),SPACE=(TRK,(1))
//*
//SORT001  EXEC PGM=SORT
//SYSOUT   DD  SYSOUT=*
//SYMNAMES DD  *
XRDW,1,04,ZD
SKIP,1
XTYP,1,04,ZD
SKIP,1
XUSR,*,08,CH
NAME,75,20,CH
SKIP,1
GRP4,*,04,CH
SKIP,1
LDAT,114,10,CH
*
/*
//IN1  DD  DISP=SHR,DSN=
//IN2  DD  DISP=SHR,DSN=
//OUT01DD  DSN=#01701.TXT,
// DISP=(NEW,CATLG),
// RECFM=FB,LRECL=45,
// SPACE=(TRK,(15,15),RLSE)
//SYSINDD  *
  OPTION COPY
  JOINKEYS F1=IN1,FIELDS=(XUSR,A),SORTED,NOSEQCK
  JOINKEYS F2=IN2,FIELDS=(XUSR,A),SORTED,NOSEQCK
  REFORMAT FIELDS=(F2:5,140)
  OUTFIL FNAMES=OUT01,
 BUILD=(1:XUSR,* 08
  X,   * 01
  NAME,* 20
  X,   * 01
  LDAT,* 10
  X,   * 01
  GRP4)* 04
/*
//*

What is it that I am doing wrong?
Regards
Jack

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security - was SDSF PS Command column

2024-02-15 Thread Jack Zukt
Hi Bill,
I can relate to your suspicions about password managers. Not to long ago
Lastpass found out that they have been hacked, which must have been a big
problem for its end users (which, fortunately I am not). On the other hand,
I have way too many passwords to be manageable without a password manager.
So, I use not one, but two. With different master passwords. And using a
password manager will not prevent you from sharing passwords with trusted
friends. I usually tell my colleagues that use excel or notepad to keep
their passwords to try and use keepass. It is as easy to use as those
methods but far for secure.
Regards
Jack


On Thu, 15 Feb 2024 at 14:01, billogden  wrote:

> My trivial comments:
>
> 1. Using a password manager seems to be putting all our eggs in one basket.
> What if that basket fails? Is it secure? Can I always access it? If we need
> to make a particular password available to a "trusted" friend (at some
> indefinite time), how should we manage that.
> 2. I have about 60+ passwords noted (on a paper, not in view of any camera)
> for various sites. Some have not been used in years, some are used
> frequently. I rather expect than very few of us (on this site) have a tiny
> number of passwords that can manage everything we need to do.
> 3. Minimum 16 characters, upper & lower case, numbers, symbols --- this can
> be very obscure to all the "computer uneducated" people that try to use the
> many services available via the web. We are expected to remember these?
> Many
> PWs are needed to avoid using the same PW for too many purposes.
> 4. Like most of us (on this site) I place tape over the camera lenses on
> all
> my systems.
> 5. Github? Being old and stupid, I have not used it yet. On my z/OS systems
> (that often run odd versions of z/OS, etc, etc) I really do not want to
> depend on a web service for program source code, etc, etc. A nice SMALL
> book
> that covers the most basic, practical uses of github (for a gethub
> beginner)
> without going into all the really wonderful things that might be done with
> it, would be handy. To me, a basic book would illustrate the specific web
> commands, the specific z/OS JCL, the specific TSO actions to install and
> perform basic operations in a simple/practical manner.
> 6. Too much obscure/difficult security == insecurity?  Amen, Amen, Amen.
> The
> IT executives seem to be in a terrific rush to go down this path. (Also,
> "too much security" seems to actually diminish the time available to
> create/improve application code, etc.)
> 7. "Trusted" (in the meanings used on this site) can be a very very complex
> concept!
>
> Bill Ogden
> z/OS old, old time z/OS person (started on OS/360 option 1), but still
> active (to some extent)!
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security - was SDSF PS Command column

2024-02-15 Thread billogden
My trivial comments:

1. Using a password manager seems to be putting all our eggs in one basket.
What if that basket fails? Is it secure? Can I always access it? If we need
to make a particular password available to a "trusted" friend (at some
indefinite time), how should we manage that.
2. I have about 60+ passwords noted (on a paper, not in view of any camera)
for various sites. Some have not been used in years, some are used
frequently. I rather expect than very few of us (on this site) have a tiny
number of passwords that can manage everything we need to do.
3. Minimum 16 characters, upper & lower case, numbers, symbols --- this can
be very obscure to all the "computer uneducated" people that try to use the
many services available via the web. We are expected to remember these? Many
PWs are needed to avoid using the same PW for too many purposes.
4. Like most of us (on this site) I place tape over the camera lenses on all
my systems.
5. Github? Being old and stupid, I have not used it yet. On my z/OS systems
(that often run odd versions of z/OS, etc, etc) I really do not want to
depend on a web service for program source code, etc, etc. A nice SMALL book
that covers the most basic, practical uses of github (for a gethub beginner)
without going into all the really wonderful things that might be done with
it, would be handy. To me, a basic book would illustrate the specific web
commands, the specific z/OS JCL, the specific TSO actions to install and
perform basic operations in a simple/practical manner.
6. Too much obscure/difficult security == insecurity?  Amen, Amen, Amen. The
IT executives seem to be in a terrific rush to go down this path. (Also,
"too much security" seems to actually diminish the time available to
create/improve application code, etc.) 
7. "Trusted" (in the meanings used on this site) can be a very very complex
concept!

Bill Ogden
z/OS old, old time z/OS person (started on OS/360 option 1), but still
active (to some extent)!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Query - do you have access to GitHub from your z/OS system? And do you have git on your z/OS system?

2024-02-15 Thread Matt Hogstrom
Currently Rocket has a good document on the installation and setup for the git 
client.  You mention GitHub.  What we’re referring to is the client to access a 
git installation.  Last I checked, the git client on z/OS only allows 
interaction with an external git instance and doesn’t provide the ability to 
serve as a git instance on z/OS.  The zOSOpenTools project has git as well.  
Here is link to their page https://github.com/ZOSOpenTools/gitport


Matt Hogstrom

“It may be cognitive, but, it ain’t intuitive."
— Hogstrom

> On Feb 15, 2024, at 05:20, Colin Paice 
> <059d4daca697-dmarc-requ...@listserv.ua.edu> wrote:
> 
> Is there a guide to installing and using github on z/OS?  Or perhaps any
> gotchas?
> 
> On Thu, 15 Feb 2024 at 09:09, Rob Scott  wrote:
> 
>> We use git on z/OS extensively throughout the company and it is one of
>> those tools where you end up thinking "how on earth did I function
>> effectively without it?".
>> 
>> We also use BitBucket for our remote repos as it interfaces very nicely
>> with Jira.
>> 
>> Rob Scott
>> Rocket Software
>> 
>> -Original Message-
>> From: IBM Mainframe Discussion List  On Behalf
>> Of Matt Hogstrom
>> Sent: Wednesday, February 14, 2024 8:32 PM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Re: Query - do you have access to GitHub from your z/OS system?
>> And do you have git on your z/OS system?
>> 
>> EXTERNAL EMAIL
>> 
>> 
>> 
>> 
>> 
>> Yes and yes.
>> 
>> 
>> 
>> Matt Hogstrom
>> 
>> “It may be cognitive, but, it ain’t intuitive."
>> — Hogstrom
>> 
>>> On Feb 14, 2024, at 14:16, Frank Swarbrick 
>> wrote:
>>> 
>>> From: IBM Mainframe Discussion List >> > on behalf of Lionel B. Dyck
>>> <057b0ee5a853-dmarc-requ...@listserv.ua.edu
>>> >
>>> Sent: Wednesday, February 14, 2024 7:20 AM
>>> To: IBM-MAIN@LISTSERV.UA.EDU 
>>> mailto:IBM-MAIN@LISTSERV.UA.EDU>>
>>> Subject: Query - do you have access to GitHub from your z/OS system? And
>> do you have git on your z/OS system?
>>> 
>>> As part of the z/OS Open Tools project I'm asking if your z/OS system
>>> has access to GitHub. The reason for this question is that IBM, ISVs,
>>> and open-source developers are increasingly using GitHub.
>>> 
>>> Questions:
>>> 
>>>   1. Do you have access to GitHub from your z/OS system?
>>>   2. Do you have git installed on your z/OS system?
>>> 
>>> Thank you
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions, send email
>> to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
>> 
>> Rocket Software, Inc. and subsidiaries ■ 77 Fourth Avenue, Waltham MA
>> 02451 ■ Main Office Toll Free Number: +1 855.577.4323
>> Contact Customer Support:
>> https://my.rocketsoftware.com/RocketCommunity/RCEmailSupport
>> Unsubscribe from Marketing Messages/Manage Your Subscription Preferences -
>> http://www.rocketsoftware.com/manage-your-email-preferences
>> Privacy Policy -
>> http://www.rocketsoftware.com/company/legal/privacy-policy
>> 
>> 
>> This communication and any attachments may contain confidential
>> information of Rocket Software, Inc. All unauthorized use, disclosure or
>> distribution is prohibited. If you are not the intended recipient, please
>> notify Rocket Software immediately and destroy all copies of this
>> communication. Thank you.
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DMARC failure in messages from this listserv

2024-02-15 Thread Radoslaw Skorupka
I am using Microsoft mail account (hotmail) and I observe similar 
problem. Many messages are sent to "unwanted" folder.
I don't know how to add IBM-MAIN to safe senders. The only thing I can 
do is manually add each address, message by message.
However it is not effective - a lot of manual work. I doubt MS service 
honour my requests.
Last, but not least: for regular mailing I use Thunderbird. But for 
"un-spamming" I have to use web browser interface.


BTW: I use this mail account almost only for IBM-MAIN and RACF-L.

--
Radoslaw Skorupka
Lodz, Poland



W dniu 13.02.2024 o 20:19, Schmitt, Michael pisze:

Microsoft Exchange has started quarantining too many messages from this listserv as 
"phishing". It is several per day; one day there was 16.

Adding theibm-m...@listserv.ua.edu  address to the Safe Senders list doesn't work because 
of how the messages are sent "on behalf of" (i.e. the sender not the listserv).

The email support team tells me that the reason the filter is catching them is 
they have dmarc failure. One example is the message below. It failed with:

Authentication-Results: spf=pass (sender IP is 130.160.0.25)
  smtp.mailfrom=listserv.ua.edu; dkim=pass (signature was verified)
  header.d=UA.EDU;dmarc=fail action=none header.from=COX.NET;compauth=fail
  reason=001


But another message from the listserv passes:

Authentication-Results: spf=pass (sender IP is 130.160.0.25)
  smtp.mailfrom=listserv.ua.edu; dkim=pass (signature was verified)
  header.d=UA.EDU;dmarc=pass action=none
  header.from=LISTSERV.UA.EDU;compauth=pass reason=100


On the other hand, messages I send to the server have mixture of pass and fail, 
and they aren't getting quarantined.


Does anyone know if this is a problem originating before it hits 
listserv.ua.edu, or is it a problem in listserv.ua.edu?


The mail people are claiming it has to be fixed at the server end.




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Query - do you have access to GitHub from your z/OS system? And do you have git on your z/OS system?

2024-02-15 Thread Lionel B. Dyck
GitHub does not offer a self-hosting option. There is GitLab which does have 
self-hosting but not on z/OS.

Only the git client runs on z/OS under OMVS and there are two options for that 
- Rocket Software or z/OS Open Tools.


Lionel B. Dyck <>< 
Github: https://github.com/lbdyck
System Z Enthusiasts Discord: 
https://discord.gg/system-z-enthusiasts-880322471608344597

“Worry more about your character than your reputation. Character is what you 
are, reputation merely what others think you are.”   - - - John Wooden

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Colin Paice
Sent: Thursday, February 15, 2024 4:21 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Query - do you have access to GitHub from your z/OS system? And do 
you have git on your z/OS system?

Is there a guide to installing and using github on z/OS?  Or perhaps any 
gotchas?

On Thu, 15 Feb 2024 at 09:09, Rob Scott  wrote:

> We use git on z/OS extensively throughout the company and it is one of 
> those tools where you end up thinking "how on earth did I function 
> effectively without it?".
>
> We also use BitBucket for our remote repos as it interfaces very 
> nicely with Jira.
>
> Rob Scott
> Rocket Software
>
> -Original Message-
> From: IBM Mainframe Discussion List  On 
> Behalf Of Matt Hogstrom
> Sent: Wednesday, February 14, 2024 8:32 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Query - do you have access to GitHub from your z/OS system?
> And do you have git on your z/OS system?
>
> EXTERNAL EMAIL
>
>
>
>
>
> Yes and yes.
>
>
>
> Matt Hogstrom
>
> “It may be cognitive, but, it ain’t intuitive."
> — Hogstrom
>
> > On Feb 14, 2024, at 14:16, Frank Swarbrick 
> > 
> wrote:
> >
> > From: IBM Mainframe Discussion List  > > on behalf of Lionel B. Dyck 
> > <057b0ee5a853-dmarc-requ...@listserv.ua.edu
> > >
> > Sent: Wednesday, February 14, 2024 7:20 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU  
> > mailto:IBM-MAIN@LISTSERV.UA.EDU>>
> > Subject: Query - do you have access to GitHub from your z/OS system? 
> > And
> do you have git on your z/OS system?
> >
> > As part of the z/OS Open Tools project I'm asking if your z/OS 
> > system has access to GitHub. The reason for this question is that 
> > IBM, ISVs, and open-source developers are increasingly using GitHub.
> >
> > Questions:
> >
> >1. Do you have access to GitHub from your z/OS system?
> >2. Do you have git installed on your z/OS system?
> >
> > Thank you
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send 
> email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> 
> Rocket Software, Inc. and subsidiaries ■ 77 Fourth Avenue, Waltham MA
> 02451 ■ Main Office Toll Free Number: +1 855.577.4323 Contact Customer 
> Support:
> https://my.rocketsoftware.com/RocketCommunity/RCEmailSupport
> Unsubscribe from Marketing Messages/Manage Your Subscription 
> Preferences - 
> http://www.rocketsoftware.com/manage-your-email-preferences
> Privacy Policy -
> http://www.rocketsoftware.com/company/legal/privacy-policy
> 
>
> This communication and any attachments may contain confidential 
> information of Rocket Software, Inc. All unauthorized use, disclosure 
> or distribution is prohibited. If you are not the intended recipient, 
> please notify Rocket Software immediately and destroy all copies of 
> this communication. Thank you.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send 
> email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security - was SDSF PS Command column

2024-02-15 Thread Radoslaw Skorupka
 Webcam when they open the binder to enter the password.  1. Very unlikely. 2. Much more effort for hacker. 3. Not everyone has 
a camera. 4. Small chance the camera will show binder content - it is 
like card game (poker, bridge) - you see figures, but a guy in front of 
you sees other side of the cards. :-) 5. It is also unlikely the camera 
scope covers keyboard and small part of desktop behind. We use cameras 
to show our faces, not panties. 6. Current laptops and cameras usually 
have blend built in. 7. For those laptops without the diaphragm there 
are diaphragm on sticker. I have one from Rocket Software just in front 
of me (thank you! :-) ). And dozen of similar veils in my drawer. 8. No, 
it is not true the tape is not effective veil/screen. It is. Even 
typical office transparent tape - yes, transparent. Just try to use it 
and read anything. Obviously painter tape, PVC tape or other are even 
better.  Don't forget about hidden camera in your 
chandelier, especially in Watergate building.


--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: z/OS hosting

2024-02-15 Thread Tomer Zelberzvig
Hi Gadi,

In the US there's a company called Maintec see more details below:
https://www.maintec.com/mainframe-hosting/

I think Kyndryl and CDW offers similar services and I'm sure there are others.
https://www.kyndryl.com/us/en/services/core-enterprise-zcloud
https://www.cdw.com/content/cdw/en/services/amplified-managed-services.html

Hopes this helps.

Tomer

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: z/OS hosting

2024-02-15 Thread Alain Benvéniste
Hi

Do you have a country constraint ?
Do you have a DR request ?

Resiliency Services on Z Mainframe
alain.benveni...@kyndryl.com 

> Le 15 févr. 2024 à 11:40, Gadi Ben-Avi  a écrit :
> 
> Hi,
> I was asked to investigate z/OS hosting.
> Can any one point me to companies that provides this type of service?
> If you've move from on premis to a hosted environment, and would like to 
> share your experience, I would like to hear it.
> 
> Thanks
> 
> Gadi
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


z/OS hosting

2024-02-15 Thread Gadi Ben-Avi
Hi,
I was asked to investigate z/OS hosting.
Can any one point me to companies that provides this type of service?
If you've move from on premis to a hosted environment, and would like to share 
your experience, I would like to hear it.

Thanks

Gadi

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Query - do you have access to GitHub from your z/OS system? And do you have git on your z/OS system?

2024-02-15 Thread Colin Paice
Is there a guide to installing and using github on z/OS?  Or perhaps any
gotchas?

On Thu, 15 Feb 2024 at 09:09, Rob Scott  wrote:

> We use git on z/OS extensively throughout the company and it is one of
> those tools where you end up thinking "how on earth did I function
> effectively without it?".
>
> We also use BitBucket for our remote repos as it interfaces very nicely
> with Jira.
>
> Rob Scott
> Rocket Software
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf
> Of Matt Hogstrom
> Sent: Wednesday, February 14, 2024 8:32 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Query - do you have access to GitHub from your z/OS system?
> And do you have git on your z/OS system?
>
> EXTERNAL EMAIL
>
>
>
>
>
> Yes and yes.
>
>
>
> Matt Hogstrom
>
> “It may be cognitive, but, it ain’t intuitive."
> — Hogstrom
>
> > On Feb 14, 2024, at 14:16, Frank Swarbrick 
> wrote:
> >
> > From: IBM Mainframe Discussion List  > > on behalf of Lionel B. Dyck
> > <057b0ee5a853-dmarc-requ...@listserv.ua.edu
> > >
> > Sent: Wednesday, February 14, 2024 7:20 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU 
> > mailto:IBM-MAIN@LISTSERV.UA.EDU>>
> > Subject: Query - do you have access to GitHub from your z/OS system? And
> do you have git on your z/OS system?
> >
> > As part of the z/OS Open Tools project I'm asking if your z/OS system
> > has access to GitHub. The reason for this question is that IBM, ISVs,
> > and open-source developers are increasingly using GitHub.
> >
> > Questions:
> >
> >1. Do you have access to GitHub from your z/OS system?
> >2. Do you have git installed on your z/OS system?
> >
> > Thank you
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email
> to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> 
> Rocket Software, Inc. and subsidiaries ■ 77 Fourth Avenue, Waltham MA
> 02451 ■ Main Office Toll Free Number: +1 855.577.4323
> Contact Customer Support:
> https://my.rocketsoftware.com/RocketCommunity/RCEmailSupport
> Unsubscribe from Marketing Messages/Manage Your Subscription Preferences -
> http://www.rocketsoftware.com/manage-your-email-preferences
> Privacy Policy -
> http://www.rocketsoftware.com/company/legal/privacy-policy
> 
>
> This communication and any attachments may contain confidential
> information of Rocket Software, Inc. All unauthorized use, disclosure or
> distribution is prohibited. If you are not the intended recipient, please
> notify Rocket Software immediately and destroy all copies of this
> communication. Thank you.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Query - do you have access to GitHub from your z/OS system? And do you have git on your z/OS system?

2024-02-15 Thread Rob Scott
We use git on z/OS extensively throughout the company and it is one of those 
tools where you end up thinking "how on earth did I function effectively 
without it?".

We also use BitBucket for our remote repos as it interfaces very nicely with 
Jira.

Rob Scott
Rocket Software

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Matt Hogstrom
Sent: Wednesday, February 14, 2024 8:32 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Query - do you have access to GitHub from your z/OS system? And do 
you have git on your z/OS system?

EXTERNAL EMAIL





Yes and yes.



Matt Hogstrom

“It may be cognitive, but, it ain’t intuitive."
— Hogstrom

> On Feb 14, 2024, at 14:16, Frank Swarbrick  
> wrote:
>
> From: IBM Mainframe Discussion List  > on behalf of Lionel B. Dyck
> <057b0ee5a853-dmarc-requ...@listserv.ua.edu
> >
> Sent: Wednesday, February 14, 2024 7:20 AM
> To: IBM-MAIN@LISTSERV.UA.EDU 
> mailto:IBM-MAIN@LISTSERV.UA.EDU>>
> Subject: Query - do you have access to GitHub from your z/OS system? And do 
> you have git on your z/OS system?
>
> As part of the z/OS Open Tools project I'm asking if your z/OS system
> has access to GitHub. The reason for this question is that IBM, ISVs,
> and open-source developers are increasingly using GitHub.
>
> Questions:
>
>1. Do you have access to GitHub from your z/OS system?
>2. Do you have git installed on your z/OS system?
>
> Thank you


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Rocket Software, Inc. and subsidiaries ■ 77 Fourth Avenue, Waltham MA 02451 ■ 
Main Office Toll Free Number: +1 855.577.4323
Contact Customer Support: 
https://my.rocketsoftware.com/RocketCommunity/RCEmailSupport
Unsubscribe from Marketing Messages/Manage Your Subscription Preferences - 
http://www.rocketsoftware.com/manage-your-email-preferences
Privacy Policy - http://www.rocketsoftware.com/company/legal/privacy-policy


This communication and any attachments may contain confidential information of 
Rocket Software, Inc. All unauthorized use, disclosure or distribution is 
prohibited. If you are not the intended recipient, please notify Rocket 
Software immediately and destroy all copies of this communication. Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Insecure security - was SDSF PS Command column

2024-02-15 Thread Jack Zukt
Hello all,

That is an interesting point. However how many of you are still able to
manage your passwords withiut using a password manager?
I gave up many years ago.
Regards
Jack

On Wed, Feb 14, 2024, 15:13 Pommier, Rex  wrote:

> Steve,
>
> You make a good point about making security so onerous one can't use it.
> At my employer, we use a third party cloud application (unnamed to conceal
> the perpetrator) that doesn't use multi-factor yet.  However their password
> to get in has to be a minimum of 16 characters.  No problem, right, just
> use a passphrase type password.  However, they also require upper, lower,
> number, and special character.  And they keep a history of 10 prior
> passwords and require a change every 60 days.  Their requirements pretty
> much guarantee most people will be writing the passwords down, thus
> bypassing a lot of the security they think they have.
>
> Rex
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf
> Of Steve Thompson
> Sent: Wednesday, February 14, 2024 8:49 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: [EXTERNAL] Re: SDSF PS Command column
>
> Seymour, this is a very interesting observation you made.
>
> I'm now experiencing similar
>
> With a certain banking system we use, you logon, and then you have to
> prove you are the person you say you are by providing more information.
> While having 2 factor authentication.
>
> With a certain cell provider, you have to login, then provide your PIN,
> then tell them your IMEI 
>
> How many people have that information memorized?
>
> At some point we make being secure, *insecure,* because we won't talk to
> you because we can't be sure you are who you say you are, even with 2
> factor authentication, and your password.
>
> Corporate paranoia.
>
> Steve Thompson
>
> On 2/13/2024 11:31 PM, Seymour J Metz wrote:
> > The  problem is not auditors; it is incompetent auditors.
> >
> > In the Army they taught us that preventing authorized access is a
> security violation. An unthinking automatic timeout is a DOS attack when it
> prevents running an annual job.
> >
> > --
> > Shmuel (Seymour J.) Metz
> > https://urldefense.com/v3/__http://mason.gmu.edu/*smetz3__;fg!!KjMRP1I
> > xj6eLE0Fj!r3eDyWon_gy4rfKn8xiwhaf7-aligjydAdLV_p-26FcFegDBRI5PS9lR5OH9
> > bl_WBA3n8nAu4SOXe5hz$
> > עַם יִשְׂרָאֵל חַי
> > נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר
> >
> > 
> > From: IBM Mainframe Discussion List  on
> > behalf of Farley, Peter
> > <031df298a9da-dmarc-requ...@listserv.ua.edu>
> > Sent: Monday, February 5, 2024 12:27 PM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: SDSF PS Command column
> >
> > I am constantly amazed at how much this whole “zero trust” meme is
> violating the concept of sharing everything among application developers.
> I for one have no qualms about any other application programmer at my shop
> seeing any coding I am doing (though I might be occasionally embarrassed by
> my own dumb mistakes).
> >
> > It is not “innocent” to share access to application programming
> information and styles and pitfalls, it is crucial to application
> programmer development and advancement.  We learn from each other,
> especially from sharing our mistakes as well as our best practices and
> clever innovations.
> >
> > Add to that stupid security rules like “if you didn’t access this
> resource for the last 180 days we revoke your access to that resource”,
> which causes all kinds of headaches when you have to suddenly deal with
> issues in a yearly weekend production process and you don’t have read
> rights to the data files you need to view to resolve the issue and the
> security team only works 9 to 5 weekdays and the on-call is out shopping
> somewhere.
> >
> > Shakespeare was almost right – first get rid of all the auditors, the
> lawyers are easy to deal with compared to them.
> >
> > Peter
> > From: IBM Mainframe Discussion List  On
> > Behalf Of Paul Gilmartin
> > Sent: Monday, February 5, 2024 11:02 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: SDSF PS Command column
> >
> >
> > On Mon, 5 Feb 2024 11:02:07 +, Rob Scott wrote:
> >
> >> ...
> >> As to "why don't you just fix it ?"tstyle questions, we have to
> consider quite a few compatibility issues across n-2 releases especially
> when the "fix" requires changes to configuration and security ...
> > Such as users' embedding cryptographic keys in commands?  Ugh!
> >
> >
> >
> > UNIX arose in a more innocent age when no one worried much about such as:
> >
> >  ls -lt /u
> >
> >
> >
> > --
> >
> > This message and any attachments are intended only for the use of the
> addressee and may contain information that is privileged and confidential.
> If the reader of the message is not the intended recipient or an authorized
> representative of the intended recipient, you are hereby notified that any
> dissemination of this communication is strictly prohibited. If you have
> received this