On 15 Oct 2010 05:28:21 -0700, in bit.listserv.ibm-main you wrote:

>IEBCOPY was developed in the early- to mid-1960s, when EXCP appendages were 
>the leading edge way to do cruel and unusual things in low-level I/O.  Such 
>has not been the case since the advent of MVS/XA and a redesigned IOS in 1983. 
> New, or older and still strategic, products typically use the latest and 
>greatest techniques.  It would appear that IBM does not yet consider 
>redesigning the 45-year-old IEBCOPY as strategic.

I am more interested in the idea that we should be urging the
reduction of need to run authorized as reducing security exposures.
Also what security exposures have been added by the way ziip and zap
work?

Clark Morris
>
>Bill Fairchild
>Rocket Software
>
>> rest snipped

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to