-- snip --
The presence of bank vaults in the world means that there must also be
locksmiths in it who can open them, and I suppose that there is a similar
rationale for the skills needed to breach z/OS, but this is a public forum
in which I for one do not think we should facilitate such
Maybe it would be a good idea to ask this question on the PL1 list
([EMAIL PROTECTED])
The PL/1 internals are documented, AFAIK, in the LE books, because
EP PL/1 uses the LE runtime. The CEE procedure names also refer to LE.
Kind regards
Bernd
Am Samstag, 19. August 2006 19:32 schrieben
What happened to the Cullinane or Cullinet (sp) from the late 70's?
---
[This E-mail scanned for viruses by Declude Virus]
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with
Hi...
Is it possible to create superuser like IBMUSER.
I hav created user ABC with all SPEICAL OPERATIONS , AUDITOR privileges.
Further, I have set the userid ABC omvs id as 0 same as tht of IBMUSER.
Still I am not able to get full access to ISMF PRIMARY OPTION MENU - DFSMS
V2R10
and not able
What happened to the Cullinane or Cullinet (sp) from the late 70's?
Cullinet was purchased by CA. John Cullinane is alive active in the
Boston area.
http://www.cullinane-group.com/
When I worked for Programart in the late 90s, we had a number of former
Cullinet employees. One day they bumped
At 8/19/2006 12:37 PM, you wrote:
In a recent note, john gilmore said:
Date: Sat, 19 Aug 2006 15:14:20 +
There are ways to do what you want to do. They would be APARable as z/OS
security breaches if they werje described in sufficient detail to
be usable.
Yeah there are. All
On Sun, 20 Aug 2006 18:34:43 +0530, Jacky Bright [EMAIL PROTECTED]
wrote:
Hi...
Is it possible to create superuser like IBMUSER.
I hav created user ABC with all SPEICAL OPERATIONS , AUDITOR privileges.
Further, I have set the userid ABC omvs id as 0 same as tht of IBMUSER.
Still I am not able
But for authorized programming, the security is about as robust as
moldy cheese. (And I know I'm right about this!)
Dave - I would argue that there is no implied security for authorized
code.
Bob Shannon
Rocket Software
--
For
On Sun, 2006-08-20 at 09:23 -0400, David Cole wrote:
...
But in order to believe that MVS is a highly secure system, you would
also have to believe that everyone who has the ability to install
programs into authorized libraries is totally trustworthy. I dunno.
When you consider how many
At 8/20/2006 09:35 AM, BShannon wrote:
But for authorized programming, the security is about as robust as
moldy cheese. (And I know I'm right about this!)
Dave - I would argue that there is no implied security for authorized
code.
I would agree. And so would IBM, which is why a security
a security breach by an authorized program would not be APARable
I believe that, if an IBM supplied authorised programme, did cause a breach, it
should be APARable.
But, what do I know?
When in doubt.
PANIC!!
--
For
On 19 Aug 2006 09:37:29 -0700, in bit.listserv.ibm-main
(Message-ID:[EMAIL PROTECTED])
[EMAIL PROTECTED] wrote:
If you are aware of further ways that would be APARable, I'll
suggest that it's your ethical responsibility, not to disclose
them or even hint of their existence in a pubic forum,
snip--
In respect of your query about EXCP with DEB:
Hello: Does anyone have any sample code that does I/O (read only) by
manually building a DEB? (Bypassing OPEN and CLOSE.) ..
I want to be able to read the directory
But for authorized programming, the security is about as robust as
moldy cheese. (And I know I'm right about this!)
Dave - I would argue that there is no implied security for authorized
code.
I would agree. And so would IBM, which is why a security breach by an
authorized program would not be
In a recent note, David Cole said:
Date: Sun, 20 Aug 2006 09:51:44 -0400
Authorized programs can breach security.
There are too many reasons why authorized programs have to be written.
There are too many people who write authorized programs.
There are too many people (both inside a
---snip---
The presence of bank vaults in the world means that there must also be
locksmiths in it who can open them, and I suppose that there is a similar
rationale for the skills needed to breach z/OS, but this is a public forum
in which I
In a recent note, Ted MacNEIL said:
Date: Sun, 20 Aug 2006 14:44:42 +
a security breach by an authorized program would not be APARable
I believe that, if an IBM supplied authorised programme, did cause
a breach, it should be APARable.
But, what do I know?
I presume the OP
I believe that, if an IBM supplied authorised programme, did cause a
breach, it should be APARable
Given that MVS itself runs authorized that's a fair assumption.
Bob Shannon
Rocket Software
--
For IBM-MAIN subscribe / signoff
On Sun, 20 Aug 2006 09:54:17 -0500 Rick Fochtman [EMAIL PROTECTED] wrote:
: snip--
: In respect of your query about EXCP with DEB:
: Hello: Does anyone have any sample code that does I/O (read only) by
: manually building a DEB?
Mark Zelden wrote:
On Tue, 8 Aug 2006 11:09:27 +0200, R.S. [EMAIL PROTECTED] wrote:
BTW: Cost
of offload jobs is rather irrelevant, beacuse usually they don't burn
CPU cycles during rush hours.
No, they burn cycles whenever a dump is triggered by a MAN dataset
filling up. Yes, in some
No, they burn cycles whenever a dump is triggered by a MAN dataset
filling up. Yes, in some small shops / environments you can have
enough of them and only dump them all once a day. That doesn't
work in larger environments.
I have never seen SMF Dumps 'burn' cycles.
Make them low
In a recent note, Binyamin Dissen said:
Date: Sun, 20 Aug 2006 12:28:43 -0400
On Sun, 20 Aug 2006 09:54:17 -0500 Rick Fochtman [EMAIL PROTECTED] wrote:
:You can also use QSAM GETs to read the directory. And if you specify a
KEYLEN=8
, you can see the key of each block, so you
== Paul Gilmartin == wrote2006-08-20 02:16:
In a recent note, Thomas Berg said:
o Absence of facility to enumerate members of a compound variable.
Right, but is it really essential ? AFAICS, You can solve this
quite easily programmatically. (Albeit clumsy.)
How? One can
On Sun, 20 Aug 2006 22:10:23 +0200, Thomas Berg [EMAIL PROTECTED] wrote:
Well, I said clumsy. When I have the need to remember the compund tails
I just saves them as strings, simple example:
Parse Pull xyz
stem.xyz = 1
tails = tails xyz
etc.
I do the same. Of course, I must be certain
== Paul Gilmartin == wrote2006-08-20 23:03:
On Sun, 20 Aug 2006 22:10:23 +0200, Thomas Berg [EMAIL PROTECTED] wrote:
Well, I said clumsy. When I have the need to remember the compund tails
I just saves them as strings, simple example:
Parse Pull xyz
stem.xyz = 1
tails = tails
On Sun, 20 Aug 2006 23:40:38 +0200, Thomas Berg [EMAIL PROTECTED] wrote:
But a tail that contains a blank is not a valid tail. Am I right or have I
missed something ?
TAIL = Foo Bar
Stem.TAIL = Wombat
... but it can only be accessed by assigning the tail to a variable, not
== Paul Gilmartin == wrote2006-08-21 00:53:
On Sun, 20 Aug 2006 23:40:38 +0200, Thomas Berg [EMAIL PROTECTED] wrote:
But a tail that contains a blank is not a valid tail. Am I right or have I
missed something ?
TAIL = Foo Bar
Stem.TAIL = Wombat
... but it can only be
In [EMAIL PROTECTED], on 08/20/2006
at 09:23 AM, David Cole [EMAIL PROTECTED] said:
In fact, I'm kinda surprised that nobody's yet written a root kit for
MVS.
I'd be surprised if nobody has, as APAR documentation. IBM has a
mechanism to keep such data out of the publicly visible part of the
In
[EMAIL PROTECTED],
on 08/20/2006
at 09:35 AM, Bob Shannon [EMAIL PROTECTED] said:
Dave - I would argue that there is no implied security for authorized
code.
The Devil is in the details. If the user of an authorized service
causes a security breach, then that is not APARable against that
In [EMAIL PROTECTED], on 08/19/2006
at 10:37 AM, Paul Gilmartin [EMAIL PROTECTED] said:
If you are aware of further ways that would be APARable, I'll
suggest that it's your ethical responsibility, not to disclose them
or even hint of their existence in a pubic forum, but to initiate the
APAR.
In
[EMAIL PROTECTED],
on 08/19/2006
at 02:33 PM, Timothy Sipples [EMAIL PROTECTED] said:
One could also argue that Microsoft BASIC was great software because
it was instrumental in establishing the legal principle that software
can be copyrighted.
Wasn't ADR at that party first?
--
In [EMAIL PROTECTED], on 08/19/2006
at 06:16 PM, Paul Gilmartin [EMAIL PROTECTED] said:
How? One can come close by coding a function package in some other
language, but if I understand correctly even that can't precisely
entirely copy a compound from one stem to another.
Why not? You go
In [EMAIL PROTECTED], on
08/20/2006
at 06:34 PM, Jacky Bright [EMAIL PROTECTED] said:
Is it possible to create superuser like IBMUSER.
I'm not sure what you mean by superuser. IBMUSER is not root and does
not automatically have all privileges. z/OS does not use the Unix
2-level (root and
In [EMAIL PROTECTED], on 08/20/2006
at 12:35 AM, Thomas Berg [EMAIL PROTECTED] said:
You mean as in regular expressions ?
Well, I'd prefer a cleaner syntax then Unix regexen, more like ICON,
SNOBOL and SuperWylbur®, and I'd also like support[1] for parsing
keyword parameters.
Right. (BTW,
In [EMAIL PROTECTED], on 08/19/2006
at 03:14 PM, john gilmore [EMAIL PROTECTED] said:
There are ways to do what you want to do. They would be APARable as
z/OS security breaches if they werje described in sufficient detail
to be usable.
I read his question as meaning that he's already
In [EMAIL PROTECTED], on 08/19/2006
at 08:28 PM, john gilmore [EMAIL PROTECTED] said:
I have not exploited these weaknesses for fun or profit,
I have, but that was before MODESET provided a cleaner and supported
way to get into key zero. I've also APARed those weaknesses that I
discovered.
On Sun, 20 Aug 2006 16:24:44 -0300 Shmuel Metz (Seymour J.)
[EMAIL PROTECTED] wrote:
:In [EMAIL PROTECTED], on 08/19/2006
: at 08:28 PM, john gilmore [EMAIL PROTECTED] said:
:I have not exploited these weaknesses for fun or profit,
:I have, but that was before MODESET provided a cleaner and
Hi Tom,
Thanks your advice again.
I still have a little question on SMS.
I have three JCL to allocate 3 types datasets
s
/* case 1 allocate temporary file
//BACKUP1 EXEC PGM=ICEGENER
//SYSPRINT DD SYSOUT=*
//SYSUT1 DD DUMMY,DCB=(RECFM=FB,LRECL=80,BLKSIZE=0)
//SYSUT2 DD
Many of the contributions to this thread have struck me as moralistic,
disingenuous, or ignorant. (It's hard to know which.) Worse, they have
almost all reflected synchronic rather than diachronic thinking.
Binyamin did, however, get it right.
When I am developing and testing authorized
Hi Listers,
I need to increase size of one of the log stream structure in my CFRM Policy
for our production sysplex. Can some one give me list of steps?
Can I update structure size in-place and do I need to include statement only
for the structure whose size I am changing in my IXCMIAPU job
On Sun, 20 Aug 2006 15:57:04 -0300, Shmuel Metz (Seymour J.) [EMAIL
PROTECTED] wrote:
How? One can come close by coding a function package in some other
language, but if I understand correctly even that can't precisely
entirely copy a compound from one stem to another.
Why not? You go
On Mon, 21 Aug 2006 02:03:18 +, john gilmore [EMAIL PROTECTED] wrote:
Many of the contributions to this thread have struck me as moralistic,
disingenuous, or ignorant. (It's hard to know which.) Worse, they have
almost all reflected synchronic rather than diachronic thinking.
42 matches
Mail list logo