In <[EMAIL PROTECTED]>, on 01/13/2006 at 09:46 AM, "McKown, John" <[EMAIL PROTECTED]> said:
>Now this might be "interesting" to play around with for an uber geek. >Have a REXX exec running under a z/OS UNIX shell via telnet (not the >TSO OMVS command). The z/OS UNIX shell was invoked via a >"specialized" telnet client written especially for the following >functionality. The REXX exec does an ADDRESS TSO to run a REXX >program which invokes an APF authorized command processor. This >command processor sets up an SVC subsystem screening environment to >"trap" all the TSO terminal related SVCs. IANAL, but if I were on a jury trying you for license violations I would not be sympathetic. It's possible that your lawyer could convince me that it wasn't a breach of the T&C, but he'd have a hard row to hoe. See also Chris's message, which IMHO clarifies the boundaries. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html