In <[EMAIL PROTECTED]>, on 08/19/2006 at 03:14 PM, john gilmore <[EMAIL PROTECTED]> said:
>There are ways to do what you want to do. They would be APARable as >z/OS security breaches if they werje described in sufficient detail >to be usable. I read his question as meaning that he's already authorized and just wants to know how to build a DEB. If he wants to know how to get authorized then I'll have to[1] refer him to his systems programmer. >The presence of bank vaults in the world means that there must also >be locksmiths in it who can open them, and I suppose that there is >a similar rationale for the skills needed to breach z/OS, There is no requirement for being able to breach MVS; if I find a way to do so, I'll APAR it. If I work for a shop that wants me to provide an authorized service then they'll grant me the appropriate privileges. [1] In the sense that If I know of a hole I'll disclose it only to the relevant personnel. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see <http://patriot.net/~shmuel/resume/brief.html> We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html