In <[EMAIL PROTECTED]>, on 08/19/2006
   at 03:14 PM, john gilmore <[EMAIL PROTECTED]> said:

>There are ways to do what you want to do.  They would be APARable as
>z/OS  security breaches if they werje described in sufficient detail
>to be usable.

I read his question as meaning that he's already authorized and just
wants to know how to build a DEB. If he wants to know how to get
authorized then I'll have to[1] refer him to his systems programmer.

>The presence of bank vaults in the world means that there must also
>be  locksmiths in it who can open them, and I suppose that there is
>a similar rationale for the skills needed to breach z/OS,

There is no requirement for being able to breach MVS; if I find a way
to do so, I'll APAR it. If I work for a shop that wants me to provide
an authorized service then they'll grant me the appropriate
privileges.

[1] In the sense that If I know of a hole I'll disclose it only to
    the relevant personnel.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to