There's hardware-level instruction tracing, particularly advanced in System z10, that functions outside even the operating systems and which is extremely non-intrusive. IBM has talked a bit about this functionality previously.
Maybe we should back up six steps here. What is the original poster trying to accomplish in terms of business goal(s)? An extremely large number of companies have built highly successful business models in mainframe software without extraordinary attempts to prevent binary code inspection, so, basically, what's different in this case? - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Based in Tokyo, Serving IBM Japan / Asia-Pacific E-Mail: timothy.sipp...@us.ibm.com ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html