In <[EMAIL PROTECTED]>,
on 01/13/2006
   at 09:46 AM, "McKown, John" <[EMAIL PROTECTED]> said:

>Now this might be "interesting" to play around with for an uber geek.
>Have a REXX exec running under a z/OS UNIX shell via telnet (not the
>TSO OMVS command). The z/OS UNIX shell was invoked via a
>"specialized" telnet client written especially for the following
>functionality. The REXX exec does an ADDRESS TSO to run a REXX
>program which invokes an APF authorized command processor. This
>command processor sets up an SVC subsystem screening environment to
>"trap" all the TSO terminal related SVCs.

IANAL, but if I were on a jury trying you for license violations I
would not be sympathetic. It's possible that your lawyer could
convince me that it wasn't a breach of the T&C, but he'd have a hard
row to hoe.

See also Chris's message, which IMHO clarifies the boundaries.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to