I don't think we can call it hacking if IBM uses such techniques to implement simulators, emulators, virtualization, etc. But other vendors' using the same techniques in order to make it easier for their products to achieve authorization is a different matter, IMHO.
Bill Fairchild Rocket Software -----Original Message----- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Rick Fochtman Sent: Thursday, October 14, 2010 6:39 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Mainframe hacking? Even earlier than that, IBM used a comnination of hardware and software intercepts based around Program Interrupts to implement the Commercial Feature on the 360/44. I still have a copy of the "Emulator" that was loaded into special areas of 360/44 core that finished the process of implementing thie Commercial Feature, as well as a few other instructions in the General Instruction Set. :-) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html