Quoting "Wakser, David" <[EMAIL PROTECTED]>:

> All:
> 
>       Many years ago, I had an EXEC that would "compress" Rexx EXECs,
> making them almost impossible to read but entirely executable. Alas, I
> no longer can find that EXEC. Is there anyone willing to share such a
> thing?
> 
>       Thanks, in advance.
> 
> David Wakser
> 


Hi,
During the week that this thread was posted, I was hospitalized,
and am only beginning to make a dent in the <you really don't wanna
know how many> hundreds of accumulated emails (from home only).

While I am mostly skimming and deleting, I wanted to mention
another solution I remember implementing WBW (way back when...).

I don't know if this is still the way CMS works, but at that time
an invoked REXX exec was scanned, and 'cached' in an intermediate 
format which replaced every REXX keyword with a hex value, and also
apparently mapped variables somehow.

In any case, *someone* (I no longer remember the author's name,
but I think I have the material archived at work)
wrote a cms module whose source used the DMS... source to perform
just that 'pre-interpretation' of the exec, and save the results
as a CMS file, with some sort of flag at the beginning that meant
'this exec is ALREADY pre-parsed'.

There was a small CMS MOD that went with it, to tell the CMS
REXX processor to recognize that flag, and skip the pre-parse step.

This method was ***much*** more secure in terms of creating
an exec whose workings are not for the public eye, and which the
end user could not reasonably hack, modify, etc. 

Does anyone else remember this mod? or miss it?

Shimon

Reply via email to