Re: VTOC rename
From: Bruce Black [EMAIL PROTECTED] Actually, it sounds like a problem which should be reported to IBM. It is either a code error or a doc update. I did open a PMR, and they told me that the inconsistent VTOCIX name was the cause of the problem. Later, when I post my considerations to the list and read your update, I started to think that the name inconsistency alone had nothing to do with it. Then I found this SER NO field, and decided to delete/build the VTOCIX from scratch, which worked. I can't prove it, but I think that if I'd have renamed the VTOCIX alone, i.e. with IEHPROGM, the problem would be still there. Walter Marguccio z/OS Systems Programmer Munich - Germany -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting PDF doing the rounds
Phil Payne wrote: [...] One other little inconsistency. If you open it and click on File, Document Properties the author is given as christianr. Who works for PSI, not T3. T3 usually uses QuarkExpress to produce its PDFs, but this PDF was produced with Acrobat Distiller. Which is what PSI normally uses. Phil, How can you comment file size ? It's EXACTLY 151 071 bytes !!! It's not typical size for documents from T3, I would say more: as we all know this size is rarely used on east coast! Isn't it proof of aliens inside PSI ? We all know who is christianr, on which planet he was born. Yeah, now everything is clear... -- Radoslaw Skorupka Lodz, Poland P.S. I couldn't resist, forgive me - it's Friday. -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2007 r. kapita zakadowy BRE Banku SA (w caoci opacony) wynosi 118.064.140 z. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchwa XVI WZ z dnia 21.05.2003 r., kapita zakadowy BRE Banku SA moe ulec podwyszeniu do kwoty 118.760.528 z. Akcje w podwyszonym kapitale zakadowym bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
WLM Work Queue Viewer
Hello, We have found a very useful tool at http://www-03.ibm.com/servers/eserver/zseries/zos/wlm/tools/wlmque.html Info: is a small ISPF based tool that may assist you in displaying the appl. env. that are currently being used on your z/OS system. This can be helpful for using Websphere Application Servers when you specify minimum and maximum limits for the number of server address spaces that should be started. You can view the number of started and active server address spaces, and the service classes being used as work queues for the application environments with the help of the REXX command list. The tool can be used for any kind of application environment from Websphere, DB2 or user specified types and applications. The tool has been written on a z/OS 1.8 system and should run from z/OS 1.6 and above. Bye Regards from Barcelona (Spain) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DB2 pre-compile V7 bind and run V8?
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Ted MacNEIL [ snip ] The senior DBA is highly skilled. I have no reason to distrust his statements. Maybe I should dig a little? Question everything. Especially if it sounds illogical. -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
On 2/15/2007 7:59 PM, Don Leahy wrote: It is pretty obvious that weak passwords greatly increase the likelihood that a brute force attack will work. However, since most (all?) systems revoke userids after a very small number of unsuccessful password attempts, the issue of strong vs weak passwords is totally irrelevant to your end users, so why burden them with strict password policies? Even a weak password will stand up to a brute force attack if the userid is revoked after 3 failures. Protecting the password data base from theft is the security administrator's job, not the end user's. It doesn't matter how strong the safe or how complex the combination, if the thief can tuck it under his arm and take it home with him to work on at his leisure. Good points. Note, however, that there's a difference between requiring mixed-case passwords and having overly strict password rules. A rule requiring 8-character passwords, with at least one upper case alpha, one lower case alpha, and one numeric is not overly strict, and can be met easily by the users. Walt Farrell, CISSP z/OS Security Design, IBM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Ibmuser time out.
On a sidenote to your problem, i suggest you (as IBM explicitely does in RACF documentation) to stop using IBMUSER. You should have IBMUSER revoked. The reason is that it is a well known user, that MUST exist in every RACF database, and thus an excellent candidate for hacking attempts. In my case, i also removed its SPECIAL attribute, as an extra security step. Hope this helps, JUAN MAUTALEN -Mensaje original- De: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] En nombre de Fred Hoffman Enviado el: Jueves, 15 de Febrero de 2007 07:10 p.m. Para: IBM-MAIN@BAMA.UA.EDU Asunto: Re: Ibmuser time out. Thanks Tom for the information. It's a tso file transfer of some rather large files. It appears to be timing out. I'm not doing it, someone else is, but for a lot of their problems, I'm the go to guy. Every once in a while, something comes up, I have a brain fart and can't remember what it the world to do. Either I don't remember, or I've not encountered the problem before, most likely, I don't remember. They tell me I'm about 2 days older than dirt. LOL Thanks again. Fred -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] Behalf Of Thomas H Puddicombe Sent: Thursday, February 15, 2007 3:56 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Ibmuser time out. IIRC, abend S522 is wait time limit exceeded. The limit is/was specified in the PARMLIB member SMFPRMxx's JWT parameter. What's it waiting for? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Dataset Handling
In [EMAIL PROTECTED], on 02/13/2007 at 12:58 PM, Ward, Mike S [EMAIL PROTECTED] said: Hello all, I have a small problem and I hoping to get some opinions on how to handle it. We had some datasets that were renamed, some of these were loadlib and some proclibs. These were development libs so there isn't much restriction on the libs themselves, but since some were proclibs, Jes2 had some jcl issues. It's dangerous to allow your users to have write access to libraries needed by the system, including JES2. You should RACF protect those libraries and provide a change-control mechanism for updates. Uses can test their procs with instream procs or with the use of JCLLIB. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: JES confusion on a specific job
In [EMAIL PROTECTED], on 02/14/2007 at 04:30 PM, Pommier, Rex R. [EMAIL PROTECTED] said: This is probably a case of not seeing the forest due to the trees, but here goes. 1. SDSF has always had different views of SYSOUT depending on the panel you used. 2. In JES2 a SYSOUT data set isn't really purged until all data sets in the IOT have been marked for purge. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
In [EMAIL PROTECTED], on 02/14/2007 at 06:26 PM, David Speake [EMAIL PROTECTED] said: Has anyone addressed/resolved this type of issue. Can a usefull mapping make be made here or am I out of luck. Why not copy the old profile and use PDS85 to change all references to the old user id? -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
In [EMAIL PROTECTED], on 02/14/2007 at 12:28 PM, Jacky Bright [EMAIL PROTECTED] said: I want to force all my TSO users to keep TSO Log dataset There is none. You're probably thinking of the ISPF log. AS of now all users are able to delete the datasets while logging off from the system. If you mean exiting ISPF, you probably can't prevent it. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Start-up throws Liberty, Integrity and HP at IBM's lawyers | The Register
More on the PSI mainframe. I just love Vulture Central! It even has a quote from Phil Payne! http://www.theregister.co.uk/2007/02/16/psi_ibm_hp/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Ibmuser time out.
Thanks Juan. There are only 2 people that use this machine and I'm one of them. Security isn't really a concern in this instance. It's a long story and this is not the place to go into it. Regards, Fred Hoffman -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] Behalf Of Mautalen Juan Guillermo Sent: Friday, February 16, 2007 7:32 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Ibmuser time out. On a sidenote to your problem, i suggest you (as IBM explicitely does in RACF documentation) to stop using IBMUSER. You should have IBMUSER revoked. The reason is that it is a well known user, that MUST exist in every RACF database, and thus an excellent candidate for hacking attempts. In my case, i also removed its SPECIAL attribute, as an extra security step. Hope this helps, JUAN MAUTALEN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SUPERC allocation errors z/OS V1.8 - fix
In this case, you are probably dealing with a record length type of error. I've seen this in the past, where a PDS has a record length of 133, and the output was probably trying to use 121 for its length. Most likely someone in SUPERC development closed(?) a hole in code. In my opinion, B. A. D. now. On Thu, 15 Feb 2007 13:06:54 -0700, Paul Gilmartin [EMAIL PROTECTED] wrote: In a recent note, Mark Zelden said: Date: Thu, 15 Feb 2007 12:56:03 -0600 On Thu, 15 Feb 2007 13:46:08 -0500, Veilleux, Jon L [EMAIL PROTECTED] wrote: We ran into an interesting situation with z/OS V1.8. One of our folks uses a PDS for his listing dataset in ISPF 3.12 and 3.14. This stopped working when we upgraded to z/OS V1.8. After hitting enter we got: Listing not generated. When we hit PF1 for more information we received: Abnormal completion (RC=25). Existing list DS attribute conflict. Through some diligent tracing by our ISPF support guy we found that PTF UA31856 caused the problem. When we removed it all was well. Just thought I'd let everyone know. Thanks for letting us know. But I just checked and that PTF is not marked PE (at least not yet), so what you really need to do is open a PMR with IBM to find out if this is WAD or BAD. Is it documented anywhere that the listing data set can't be a PDS member? It has long been my experience that while SuperC has accepted HFS members as comparands, ironically it will not allow its output to be directed to an HFS member. I haven't reported this because of the highly likely WAD (IMO BAD). Now I'd better check (before and after UA31856) to see that IBM hasn't made this even worse. It's my impression that much of IBM treats HFS as a second-class citizen -- if it's broke they see little need to fix it -- they take APARs as SUG, etc. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
On Fri, 16 Feb 2007 05:37:33 +, Dave Salt [EMAIL PROTECTED] wrote: If my ISPF sysprog set all the defaults exactly the way I wanted them, it would be great. Everyone else might not agree, but I certainly wouldn't have any complaints!;-) There is no reason you can't create your own defaults and use them (be it the only assembled table or the new keyword table / ISPCCONF. I was doing it for years when I consulted full time. You just need to make sure your module is in ISPLLIB or in ISPLLIB ahead of the one a sysprog may have created (or use TSOLIB prior to ISPF invocation). I always set up my own environment when I logon in order to use my toolkit, so this has been SOP for me. Some shops give you a supported method at logon time to alter allocations etc., if they don't, then I just go to TSO READY and execute my CLIST that does what I want. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting PDF doing the rounds
On Fri, 16 Feb 2007 06:30:02 -, Phil Payne wrote: BTW - The Register story is http://www.theregister.co.uk/2007/02/16/psi_ibm_hp/ Interesting that they say HP would gain a direct link to IBM's mainframe customer base. This could prove fruitful ... As if it will make a big difference in HP sales. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SUPERC allocation errors z/OS V1.8 - fix
In a recent note, Matthew Stitt said: Date: Fri, 16 Feb 2007 08:41:37 -0600 In this case, you are probably dealing with a record length type of error. I've seen this in the past, where a PDS has a record length of 133, and the output was probably trying to use 121 for its length. Most likely someone in SUPERC development closed(?) a hole in code. In my opinion, B. A. D. now. This hole has existed in the Classic file system since OS/360. (Shmuel might correct my conjecture about history). Likewise there's the venerable pitfall of allocating a PDS and failing to specify a member, thus overwriting the directory. Rightly, both holes should be closed once and for all (perhaps leaving a back door to allow reading a PDS directory sequentially). But the fix should be done not haphazardly by individual applications, each applying its developers' idiosyncratic concept of what the rule should be, but uniformly, in OPEN code. For the PDS/PS fix, Rexx is an individual application that gets it right: It fails the attempt to open a PDS with no member specified, but allows it if the programmer allocates with overriding DSORG(PS) (the back door). Simply, that well-designed code should be moved from Rexx to OPEN, making the behavior uniform for all applications. Conway's law strikes again. -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting PDF doing the rounds
In a message dated 2/16/2007 12:39:16 A.M. Central Standard Time, [EMAIL PROTECTED] writes: Interesting. Thanks for that, Eric. So the PSI machine is on the UAB (Birmingham) site? I'll dig around, all I know is where it isn't. Speaking for Eric??? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting PDF doing the rounds
From the Register article: How could a combined PSI/HP lose with Liberty, Integrity, truth, justice and the American Way on their side? Heh. Jon -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ISPF Data Set Information strangeness
Hi, All, I created an HFS with an allocation of 10 cylinders, to be mounted on '/u' and contain only private user directory entries / mountpoints. However, when I display the DSI from ISPF 3.4 using line command 'I', it shows this: Data Set Name . . . : OMVS.USER.DIRECT General Data Current Allocation Management class . . : **None** Allocated cylinders : 92 Storage class . . . : SCOMVS Allocated extents . : 92 Volume serial . . . : TECH07 Maximum dir. blocks : NOLIMIT Device type . . . . : 3390 Data class . . . . . : **None** Organization . . . : POCurrent Utilization Record format . . . : U Used pages . . . . : 12 Record length . . . : 0 % Utilized . . . . : 1 Block size . . . . : 0 Number of members . : 3 1st extent cylinders: 1 Secondary cylinders : 1 Data set name type : HFS Can anybody explain why it shows 92 cylinders and 92 extents under current allocation? TIA, -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Finding where a module is being loaded from
Does anyone have a subroutine that can be called from another batch program in order to find out from which load library (i.e. LPA, Linkist, JOBLIB/STEPLIB) the calling program was loaded from. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting PDF doing the rounds
In a recent note, Tom Marchant said: Date: Fri, 16 Feb 2007 09:02:20 -0600 On Fri, 16 Feb 2007 06:30:02 -, Phil Payne wrote: BTW - The Register story is http://www.theregister.co.uk/2007/02/16/psi_ibm_hp/ Interesting that they say HP would gain a direct link to IBM's mainframe customer base. This could prove fruitful ... Which continues: ... in the short-term, as IBM plans to end support for older 32-bit systems and software in March. Customers looking to upgrade their aging systems would have nowhere else to turn but IBM if not for the presence of the HP/PSI combination. Is technology advancing so fast that it's to upgrade a system a few years old to an emulator? And the putative customers would still be left with unsupported software. Or would PSI adopt the software, too? I'd guess the licensing hurdles would be insurmountable -- IBM's not likely to release the source code. -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF Data Set Information strangeness
On Fri, 16 Feb 2007 09:40:35 -0600, Chase, John [EMAIL PROTECTED] wrote: Hi, All, I created an HFS with an allocation of 10 cylinders, to be mounted on '/u' and contain only private user directory entries / mountpoints. However, when I display the DSI from ISPF 3.4 using line command 'I', it shows this: Data Set Name . . . : OMVS.USER.DIRECT General Data Current Allocation Management class . . : **None** Allocated cylinders : 92 Storage class . . . : SCOMVS Allocated extents . : 92 Volume serial . . . : TECH07 Maximum dir. blocks : NOLIMIT Device type . . . . : 3390 Data class . . . . . : **None** Organization . . . : POCurrent Utilization Record format . . . : U Used pages . . . . : 12 Record length . . . : 0 % Utilized . . . . : 1 Block size . . . . : 0 Number of members . : 3 1st extent cylinders: 1 Secondary cylinders : 1 Data set name type : HFS Can anybody explain why it shows 92 cylinders and 92 extents under current allocation? John, When did you create it? Is it possible you really allocated it with 1,1 and it grew (yes, I can see it is not utilized at the moment)? Did you allocate it via ISPF or batch? Can you re-create the problem? Can you copy it to a newly allocated HFS? Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
2007 daylight savings
Is there a single apar/document that describes the changes required for the above for z/OS and all associated software. Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 2007 daylight savings
On Fri, 16 Feb 2007 15:54:10 +, Jim McAlpine [EMAIL PROTECTED] wrote: Is there a single apar/document that describes the changes required for the above for z/OS and all associated software. Start here: http://www-03.ibm.com/servers/eserver/zseries/zos/support/dst_changes.html Cutting it a little close though, eh? :-) Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 2007 daylight savings
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 02/16/2007 10:54:10 AM: Is there a single apar/document that describes the changes required for the above for z/OS and all associated software. Jim McAlpine Jim, http://www.ibm.com/support/alerts/us/en/daylightsavingstimealert.html Regards, John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 2007 daylight savings
On 2/16/07, Mark Zelden [EMAIL PROTECTED] wrote: On Fri, 16 Feb 2007 15:54:10 +, Jim McAlpine [EMAIL PROTECTED] wrote: Cutting it a little close though, eh? :-) Mark -- Not me, I'm in the UK ;-) but one of our clients across the pond. Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 2007 daylight savings
Forgot to say thanks Mark and John. Jim McAlpine On 2/16/07, Jim McAlpine [EMAIL PROTECTED] wrote: On 2/16/07, Mark Zelden [EMAIL PROTECTED] wrote: On Fri, 16 Feb 2007 15:54:10 +, Jim McAlpine [EMAIL PROTECTED] wrote: Cutting it a little close though, eh? :-) Mark -- Not me, I'm in the UK ;-) but one of our clients across the pond. Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Finding where a module is being loaded from
This is a complicated question that has been discussed here repeatedly. Look in the archives. John Gilmore Ashland, MA 01721-1817 USA _ The average US Credit Score is 675. The cost to see yours: $0 by Experian. http://www.freecreditreport.com/pm/default.aspx?sc=660600bcd=EMAILFOOTERAVERAGE -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Jes2 Question
We are z/OS V1R4 and going to z/OS V1R7. Can the spool be shared between the 2 systems? We are upgrading this weekend and I usually unload the JES2 Queues and reload the spool after the upgrade. I thought I heard I did not need to do that. I could use the same SPOOL's and switch back and forth if the need arises. Should I perform a backup. Would a full volume backup work or should I use OFFLOAD option? Any help would be appreciated. Thank You -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
FW: PSI sues IBM.
re-posting from VM-L. and have a good weekend everyone. ciao! Aurora Emanuela Dell'Anno Compuware Ltd. Systems Engineer, Mainframe pre-Sales ___ email: [EMAIL PROTECTED] tel. : +44 (0)1753 444331 cell.: +44 (0)7779 881331 ___ No trees were killed in the sending of this message. However - a large number of electrons were terribly inconvenienced. -Original Message- Sent: 23 January 2007 14:35 Subject: PSI sues IBM. Perhaps a bit OT for this list, but PSI has counter-sued IBM over it's mainframe emulator product. Details at http://www.theregister.co.uk/2007/01/22/platform_solutions_sues_ibm/ DJ The contents of this e-mail are intended for the named addressee only. It contains information that may be confidential. Unless you are the named addressee or an authorized designee, you may not copy or use it, or disclose it to anyone else. If you received it in error please notify us immediately and then destroy it. Compuware Limited (company number 1522537) is a company registered in England and Wales whose registered office is at 163 Bath Road, Slough SL1 4AA, Berkshire, United Kingdom. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Finding where a module is being loaded from
Specifically, How tell name of originating load library? from August 14, 2005. Charles -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of john gilmore Sent: Friday, February 16, 2007 8:40 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Finding where a module is being loaded from This is a complicated question that has been discussed here repeatedly. Look in the archives. John Gilmore Ashland, MA 01721-1817 USA _ The average US Credit Score is 675. The cost to see yours: $0 by Experian. http://www.freecreditreport.com/pm/default.aspx?sc=660600bcd=EMAILFOOTERAVE RAGE -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
We send our ISPF LOG and LIST datasets to SYSOUT. You could send them to some protected output class and archive them if necessary. Jim McAlpine On 2/14/07, Jacky Bright [EMAIL PROTECTED] wrote: Hi, I want to force all my TSO users to keep TSO Log dataset so that activities carried out by all TSO users can be recorded. AS of now all users are able to delete the datasets while logging off from the system. How to configure this ? JAcky -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
snip--- Good points. Note, however, that there's a difference between requiring mixed-case passwords and having overly strict password rules. A rule requiring 8-character passwords, with at least one upper case alpha, one lower case alpha, and one numeric is not overly strict, and can be met easily by the users. -unsnip--- That's true, Walt. But how do you prevent the user from burying his id, or an anagram of it, in the password without using an exit? We found that to be the most prevalent security-related issue when we had to grant acces to non-DP oriented users, like the traders on the floor at the Chicago Board of Trade. (Forcing regular password changes was a whole other issue. G) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Finding where a module is being loaded from
in addition to the archive, you may want to look at ispf's isrddn. Oscar Flores [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 02/16/2007 10:52 AM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Finding where a module is being loaded from Does anyone have a subroutine that can be called from another batch program in order to find out from which load library (i.e. LPA, Linkist, JOBLIB/STEPLIB) the calling program was loaded from. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
On 16 Feb 2007 09:05:19 -0800, [EMAIL PROTECTED] (Rick Fochtman) wrote: That's true, Walt. But how do you prevent the user from burying his id, or an anagram of it, in the password without using an exit? We found that to be the most prevalent security-related issue when we had to grant acces to non-DP oriented users, like the traders on the floor at the Chicago Board of Trade. (Forcing regular password changes was a whole other issue. G) Let me see, this is February of 2007, my password must be B02razee07. Gets me past the password cops, I don't write my password down, and can do my work. Hey, it can be broken - but if I don't work, I don't get paid - security is someone else's problem. Years ago I had a Vax class - my instructor was French, so she was able to use passwords that the English language password parser did not recognize as words. But just as security isn't my job - developing a useable replacement for passwords apparently isn't the job of our local security staff - not without a budget and support to do something better. And apparently nobody is solving the problem of world-wide security with people using the same password on a hundred web sites (meaning that they can be phished).The occasional article telling them this is dangerous does nothing - if they read it, they can't remember a hundred different secure passwords. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Jes2 Question
On Fri, 16 Feb 2007 10:56:07 -0600, Mark Steely [EMAIL PROTECTED] wrote: We are z/OS V1R4 and going to z/OS V1R7. Can the spool be shared between the 2 systems? We are upgrading this weekend and I usually unload the JES2 Queues and reload the spool after the upgrade. I thought I heard I did not need to do that. I could use the same SPOOL's and switch back and forth if the need arises. Should I perform a backup. Would a full volume backup work or should I use OFFLOAD option? Any help would be appreciated. Since that is (was) a supported migration path, the answer is certainly yes. Of course you need to make sure you have all the coexistence maintenance applied to your z/OS 1.4 system(s). All of this is covered in the planning manuals: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/Shelves/E0Z2BK61 Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Finding where a module is being loaded from
Check the CBT tape, www.cbttape.org. Several routines scattered around on the tape that will do what you want. I use FINDMOD in both batch and as a sub-routine. On Fri, 16 Feb 2007 12:26:31 -0500, Jack Kelly [EMAIL PROTECTED] wrote: in addition to the archive, you may want to look at ispf's isrddn. Oscar Flores [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 02/16/2007 10:52 AM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Finding where a module is being loaded from Does anyone have a subroutine that can be called from another batch program in order to find out from which load library (i.e. LPA, Linkist, JOBLIB/STEPLIB) the calling program was loaded from. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Jes2 Question
This mechanism has been supported for a long time. I've been sharing JES2 between different releases since OS/390 V1R1. Just follow the simple steps to create a JES2 MAS, including basic sysplex if needed. As Mark indicated, make sure all toleration maintenance is applied to all the systems. On Fri, 16 Feb 2007 12:16:58 -0600, Mark Zelden [EMAIL PROTECTED] wrote: On Fri, 16 Feb 2007 10:56:07 -0600, Mark Steely [EMAIL PROTECTED] wrote: We are z/OS V1R4 and going to z/OS V1R7. Can the spool be shared between the 2 systems? We are upgrading this weekend and I usually unload the JES2 Queues and reload the spool after the upgrade. I thought I heard I did not need to do that. I could use the same SPOOL's and switch back and forth if the need arises. Should I perform a backup. Would a full volume backup work or should I use OFFLOAD option? Any help would be appreciated. Since that is (was) a supported migration path, the answer is certainly yes. Of course you need to make sure you have all the coexistence maintenance applied to your z/OS 1.4 system(s). All of this is covered in the planning manuals: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/Shelves/E0Z2BK61 Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Howard Brazee Sent: Friday, February 16, 2007 11:32 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 SNIP But just as security isn't my job - developing a useable replacement for passwords apparently isn't the job of our local security staff - not without a budget and support to do something better. And apparently nobody is solving the problem of world-wide security with people using the same password on a hundred web sites (meaning that they can be phished).The occasional article telling them this is dangerous does nothing - if they read it, they can't remember a hundred different secure passwords. SNIP Kind of what I was driving at when I said something about all the accounts that I have to have a user id and password for. Banks, clubs, employers (and how many systems have their own password/userid and associated rules?), etc. We are becoming unsecure by trying to be so secure. Not everyone has photographic memory so that they can remember all their userid/password combinations (where they can write it down, look at it, then destroy the paper). This is why PDAs are becoming dangerous as are laptops with their wallets and the like where people keep their userids and passwords in their browsers. I do not have the answer(s), I just started thinking about the simple solutions that people will use, but allow risk of compromise being increased. Later, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Thompson, Steve Sent: Friday, February 16, 2007 12:48 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 snip We are becoming unsecure by trying to be so secure. Not everyone has photographic memory so that they can remember all their userid/password combinations (where they can write it down, look at it, then destroy the paper). This is why PDAs are becoming dangerous as are laptops with their wallets and the like where people keep their userids and passwords in their browsers. I do not have the answer(s), I just started thinking about the simple solutions that people will use, but allow risk of compromise being increased. Later, Steve Thompson One thing that can be done with the Konqueror web browser and KDE on Linux is to use KDE Wallet. This is an encrypted file which contains various userids and passwords. Konqueror (and other software) can interface with the KDE Wallet. The program asks for the wallet's password and pass it to the interface along with the resource whose password is needed. The wallet then gives the appropriate password back to the application. This may have been what you were talking about with wallets, but I'm not sure. This is somewhat better than writing it down, but only works for programs which can interface with KDE Wallet. At cutesy overview is at: http://www.marcelgagne.com/cwl012005.html -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
From: Mark Zelden [EMAIL PROTECTED] There is no reason you can't create your own defaults and use them (be it the only assembled table or the new keyword table / ISPCCONF. I was doing it for years when I consulted full time. You just need to make sure your module is in ISPLLIB or in ISPLLIB ahead of the one a sysprog may have created (or use TSOLIB prior to ISPF invocation). I could have used that back when my userid kept changing, but these days I've had the same ID for years and it probably won't change. Still, it's useful to know about so thanks for sharing it. I just tried ISPCCONF, but got command not found. I'll have to look into it. Thanks again, Dave _ http://local.live.com/default.aspx?v=2cp=43.658648~-79.383962style=rlvl=15tilt=-90dir=0alt=-1000scene=3702663cid=7ABE80D1746919B4!1329 From January 26 to February 8, 2007 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
On 16 Feb 2007 11:01:44 -0800, [EMAIL PROTECTED] (McKown, John) wrote: One thing that can be done with the Konqueror web browser and KDE on Linux is to use KDE Wallet. This is an encrypted file which contains various userids and passwords. Konqueror (and other software) can interface with the KDE Wallet. The program asks for the wallet's password and pass it to the interface along with the resource whose password is needed. The wallet then gives the appropriate password back to the application. This may have been what you were talking about with wallets, but I'm not sure. This is somewhat better than writing it down, but only works for programs which can interface with KDE Wallet. If we can carry this wallet from computer to computer, then this could be an acceptable solution. But if we lose this wallet, we lose our passwords. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Ibmuser time out.
At 15 Feb 2007 22:14:36 GMT, concerning Ibmuser time out., Fred Hoffman [EMAIL PROTECTED] wrote (to ): [snip] It's a tso file transfer of some rather large files. It appears to be timing out. I'm not doing it, someone else is, but for a lot of their problems, I'm the go to guy. [snip] Fred: you might verify the method of transferring files ie. are they downloading through their 3270 emulator? I recall, more than a decade ago, a client/user having similar time-out problems when transferring a large file to the workstation via IND$FILE. (invoked directly by the emulator) It appeared (I *still* have no idea how) the underlying mechanism was 'printing' through the 'screen' and they were getting the TSO '***' marker when the 'screen' was full. They moved to using ftp instead. (and got *big* through-puts as a bonus) The emulator download/upload was just more convenient. -- signature = 6 lines follows -- Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada telephone:1 613 562 5800 x4585 fax:1 613 562 5161 mailto:NDuffee of uOttawa.ca http:/ /aix1.uottawa.ca/ ~nduffee How *do* you plan for something like that? Guardian Bob, Reboot For every action, there is an equal and opposite criticism. Systems Programming: Guilty, until proven innocent John Norgauer 2004 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Finding where a module is being loaded from
Thanks! I got FINDMOD from the CBT tape and works fine as a command but I get a cc 12 when I execute it in batch. Would you please send me a sample as to how you use it in batch. From: Matthew Stitt [EMAIL PROTECTED] Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Finding where a module is being loaded from Date: Fri, 16 Feb 2007 12:38:44 -0600 Check the CBT tape, www.cbttape.org. Several routines scattered around on the tape that will do what you want. I use FINDMOD in both batch and as a sub-routine. On Fri, 16 Feb 2007 12:26:31 -0500, Jack Kelly [EMAIL PROTECTED] wrote: in addition to the archive, you may want to look at ispf's isrddn. Oscar Flores [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 02/16/2007 10:52 AM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Finding where a module is being loaded from Does anyone have a subroutine that can be called from another batch program in order to find out from which load library (i.e. LPA, Linkist, JOBLIB/STEPLIB) the calling program was loaded from. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Humor OT The Help Desk
http://www.youtube.com/watch?v=eRjVeRbhtRU -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
On Fri, 16 Feb 2007 19:05:30 +, Dave Salt [EMAIL PROTECTED] wrote: From: Mark Zelden [EMAIL PROTECTED] There is no reason you can't create your own defaults and use them (be it the only assembled table or the new keyword table / ISPCCONF. I was doing it for years when I consulted full time. You just need to make sure your module is in ISPLLIB or in ISPLLIB ahead of the one a sysprog may have created (or use TSOLIB prior to ISPF invocation). I could have used that back when my userid kept changing, but these days I've had the same ID for years and it probably won't change. Still, it's useful to know about so thanks for sharing it. I just tried ISPCCONF, but got command not found. I'll have to look into it. Thanks again, Same userid or not, there are other things that the defaults module controls that you can't override. For example SETUNDO STG. Of course now I'm perhaps spreading information to people that shouldn't really be changing this stuff. I hope no one from our general user population reads IBM-MAIN. :-) Anyway, ISPCCONF is in hlq.SISPEXEC along with some SCLM execs and some other goodies like ISRFIND, ISREPDF, ISRBPDF and ISPMLIST. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Friday, February 16, 2007 1:01 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Thompson, Steve Sent: Friday, February 16, 2007 12:48 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 snip We are becoming unsecure by trying to be so secure. Not everyone has photographic memory so that they can remember all their userid/password combinations (where they can write it down, look at it, then destroy the paper). This is why PDAs are becoming dangerous as are laptops with their wallets and the like where people keep their userids and passwords in their browsers. I do not have the answer(s), I just started thinking about the simple solutions that people will use, but allow risk of compromise being increased. Later, Steve Thompson One thing that can be done with the Konqueror web browser and KDE on Linux is to use KDE Wallet. This is an encrypted file which contains various userids and passwords. Konqueror (and other software) can interface with the KDE Wallet. The program asks for the wallet's password and pass it to the interface along with the resource whose password is needed. The wallet then gives the appropriate password back to the application. This may have been what you were talking about with wallets, but I'm not sure. SNIP You mean, should your computer (laptop) be stolen, one could then boot using a LIVE Linux CD, and crack the wallet contents... Come to think of it, with a LIVE Linux CD, one can crack NTFS files used by Windows This is why in our pursuit of security, we make ourselves unsecure because of all the accounts we have that we have to have a userid and password for. And if kept in that wallet, once it is hacked, what damage could be done? Think about this for a moment. How many web sites require you to register before you can look at their content. This adds to the issue. How many use the same throw-away userid across as many junk sites/accounts as possible, but keep the same password as they use for their banking ids? While I may have said this backwards, I think you can see the point. Again, I do not have a solution because the things that I would have pointed out or pointed to have already been shown to not be so secure after all by others on IBM-Main. Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
License keys for ISV products
This note is addressed primarily to product developers. Is there anyone reading this list who sells a license key product for z/OS ISV software? By license key product I mean a set of functions that could be integrated into another software product to provide expiration dates, machine serial number checking, feature control, etc. Is there anyone reading this list who had developed a license key product for their own use, and who might be willing to license it to another vendor? The product in question is z/OS only batch. Private replies are probably most appropriate: charlesm at mcn dot org Thanks, Charles Mills -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
JES2 CMD output display limit
In the CONDEF parms in JES2, the DISPMAX= value limits the amount of a JES2 display command's output. Short of changing that value, isn't there a parm string to add to any JES2 command to override that? Seems I recall it used to work that way, no?! Like a display command for example: $DRDI(*) to list all of your systems' defined internal readers. Most systems have lots, and the output display cuts off before it gets to listing them all. Or is it since the introduction of the DISPMAX parm in CONDEF, they changed all JES2 commands? I've looked and can't seem to locate it.even tore thru QuickRef lots. Must be either a brain-cramp, or lost brain cells from dementia, ay?! THANX, Mark H. Young Fairfax County Gov't, Virginia -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
JES2 CMD truncation
Remember in the old days when issuing a JES2 command, if you had invalid extra parms on the command string, JES2 would just ignore the invalid stuff, truncate it and issue the part of the command that WAS correct? Does it still work that way, or did IBM fix that added feature some time ago? Seems like I got clobbered a time or two by that when issuing a command to delete output that was say 4 days old or older (the entire queue). I goofed the value, JES2 truncated the bad part, and proceeded to purge ALL output.even from 2 minutes ago. THANX, Mark H. Young Fairfax County Gov't, Virginia -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: License keys for ISV products
I am not a developer - but please don't do it. Products with built-in license checking are a real PITA for customers. If you insist on doing this checking, make sure you have the ability to provide a universal license code that bypasses CPUid checking; your best customers will appreciate it. Don Imbriale -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Charles Mills Sent: Friday, February 16, 2007 2:57 PM To: IBM-MAIN@BAMA.UA.EDU Subject: License keys for ISV products This note is addressed primarily to product developers. Is there anyone reading this list who sells a license key product for z/OS ISV software? By license key product I mean a set of functions that could be integrated into another software product to provide expiration dates, machine serial number checking, feature control, etc. Is there anyone reading this list who had developed a license key product for their own use, and who might be willing to license it to another vendor? The product in question is z/OS only batch. *** Bear Stearns is not responsible for any recommendation, solicitation, offer or agreement or any information about any transaction, customer account or account activity contained in this communication. *** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
Keepers of the LOG, What if the ISPF user sets their primary and secondary LOG pages both to zero, no log? EdP Jim McAlpine [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 02/16/2007 12:00 PM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Disposition of Log data in ISPF Panel We send our ISPF LOG and LIST datasets to SYSOUT. You could send them to some protected output class and archive them if necessary. Jim McAlpine On 2/14/07, Jacky Bright [EMAIL PROTECTED] wrote: Hi, I want to force all my TSO users to keep TSO Log dataset so that activities carried out by all TSO users can be recorded. AS of now all users are able to delete the datasets while logging off from the system. How to configure this ? JAcky -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: JES2 CMD output display limit
On Fri, 16 Feb 2007 14:02:08 -0600, Mark H. Young [EMAIL PROTECTED] wrote: In the CONDEF parms in JES2, the DISPMAX= value limits the amount of a JES2 display command's output. Short of changing that value, isn't there a parm string to add to any JES2 command to override that? Seems I recall it used to work that way, no?! Like a display command for example: $DRDI(*) to list all of your systems' defined internal readers. Most systems have lots, and the output display cuts off before it gets to listing them all. Or is it since the introduction of the DISPMAX parm in CONDEF, they changed all JES2 commands? I've looked and can't seem to locate it.even tore thru QuickRef lots. Must be either a brain-cramp, or lost brain cells from dementia, ay?! It is documented when DISPMAX doesn't apply, but you have to read in-between the lines and understand consoles a little. The DISPMAX= parameter is not honored when: 1. Output is displayed for error conditions. 2. Output is destined for an out-of-line area on the MCS console. 3. A command is issued with the expicit L= keyword specifying an out-of-line area. Using your example from above you could use the command $DRDI(*),L=Z to see all the output. Cheers, Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF Data Set Information strangeness
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Mark Zelden On Fri, 16 Feb 2007 09:40:35 -0600, Chase, John wrote: Hi, All, I created an HFS with an allocation of 10 cylinders, to be mounted on '/u' and contain only private user directory entries / mountpoints. However, when I display the DSI from ISPF 3.4 using line command 'I', it shows this: Data Set Name . . . : OMVS.USER.DIRECT General Data Current Allocation Management class . . : **None** Allocated cylinders : 92 Storage class . . . : SCOMVS Allocated extents . : 92 Volume serial . . . : TECH07 Maximum dir. blocks : NOLIMIT Device type . . . . : 3390 Data class . . . . . : **None** Organization . . . : POCurrent Utilization Record format . . . : U Used pages . . . . : 12 Record length . . . : 0 % Utilized . . . . : 1 Block size . . . . : 0 Number of members . : 3 1st extent cylinders: 1 Secondary cylinders : 1 Data set name type : HFS Can anybody explain why it shows 92 cylinders and 92 extents under current allocation? John, When did you create it? Is it possible you really allocated it with 1,1 and it grew (yes, I can see it is not utilized at the moment)? Did you allocate it via ISPF or batch? Can you re-create the problem? Can you copy it to a newly allocated HFS? Think I figured it out: Apparently one user either forgot to allocate/mount his private HFS or misread my instructions to do so. Anyway, he did a bunch of stuff that used a lot of space, then cleaned up the mess. Not a really big deal, since it's on the sandbox. -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Password rules including my disdain for mixed case was Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
On Fri, 16 Feb 2007 10:31:35 -0700, in bit.listserv.ibm-main you wrote: On 16 Feb 2007 09:05:19 -0800, [EMAIL PROTECTED] (Rick Fochtman) wrote: That's true, Walt. But how do you prevent the user from burying his id, or an anagram of it, in the password without using an exit? We found that to be the most prevalent security-related issue when we had to grant acces to non-DP oriented users, like the traders on the floor at the Chicago Board of Trade. (Forcing regular password changes was a whole other issue. G) Let me see, this is February of 2007, my password must be B02razee07. As someone who is keeping straight a large number of passwords (2 email, 2 financial, 1 for the place I sometimes contract for, 3 home passwords, one of which is written down, 1 weak password for yahoo, a password for the LAN when on a contract and a password for the mainframes), I have several rules. I will use special characters that seem invariant across code pages if allowed such as period slash and comma. My minimum password is 7 characters and it will have letters and numbers. I won't use upper case unless forced and will send memos stating why this is a BAD idea. I have enough problems typing and remembering to put up with trying to remember when to shift and don't need typing complications. Unless I believe that I have compromised a password, I won't change it unless forced to because I believe that it is an exercise in futility designed to pacify security administrators. If someone has stolen the password database, there are worse problems than my not changing a password. If there is a keystroke logger on my computer, frequent changes won't matter (note that at home I run 2 spyware checkers with online checking and an Internet Security suite that worried about Quicktax doing keystroke monitoring). While like a paranoid systems programmer, I don't automatically update Windows, I do so periodically and read the notes for the updates which seem as good as many of those I have seen for APARs. It is ironic that the only special characters allowed in things like user-ids are three that in EBCDIC are not stable across code pages. If someone wants to make the password stronger, give me the stable special characters and longer passwords. One of my financial passwords exceeds 8 characters but not all institutions will accept a longer password. Note that a fingerprint should be easy to capture and forge. The better biometric might be an audible voice qa. Gets me past the password cops, I don't write my password down, and can do my work. Hey, it can be broken - but if I don't work, I don't get paid - security is someone else's problem. Years ago I had a Vax class - my instructor was French, so she was able to use passwords that the English language password parser did not recognize as words. But just as security isn't my job - developing a useable replacement for passwords apparently isn't the job of our local security staff - not without a budget and support to do something better. And apparently nobody is solving the problem of world-wide security with people using the same password on a hundred web sites (meaning that they can be phished).The occasional article telling them this is dangerous does nothing - if they read it, they can't remember a hundred different secure passwords. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: License keys for ISV products
I have a lot of experience as a mainframe software vendor. I totally understand what you are saying. The other side of the coin is that some customers abuse software vendors. At my former company, we had several of what we called the trial from h---. A prospect would run a trial forever, with excuses like my boss is in a bad mood, I'm not going to bring a license in there for him to sign today. If the salesman after months and months of exasperation threatened to send him a legal letter, he would say I can tell you if you do that we'll never buy your product. The poor salesman would not know what to do, and the free trial would drag on and on and on. Our average 30-day trial went from about 180 days to 90 days when we added an expiration date, and that was a good thing. Also, when we added checking to our product, an amazing number of customers surfaced who had no idea that group was running your product on that box. Yes, our licensing worked so that the serial number check was not totally hard. The product would run on any serial number with a warning. I am fully aware of the what if we have a disaster at dark oh thirty and are up to our butts in alligators without having to track you down for a key? issue. Charles -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Imbriale, Donald (Exchange) Sent: Friday, February 16, 2007 12:09 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: License keys for ISV products I am not a developer - but please don't do it. Products with built-in license checking are a real PITA for customers. If you insist on doing this checking, make sure you have the ability to provide a universal license code that bypasses CPUid checking; your best customers will appreciate it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF Data Set Information strangeness
On Fri, 16 Feb 2007 14:28:32 -0600, Chase, John [EMAIL PROTECTED] wrote: I created an HFS with an allocation of 10 cylinders, to be mounted on '/u' and contain only private user directory entries / mountpoints. However, when I display the DSI from ISPF 3.4 using line command 'I', it shows this: Data Set Name . . . : OMVS.USER.DIRECT General Data Current Allocation Management class . . : **None** Allocated cylinders : 92 Storage class . . . : SCOMVS Allocated extents . : 92 Volume serial . . . : TECH07 Maximum dir. blocks : NOLIMIT Device type . . . . : 3390 Data class . . . . . : **None** Organization . . . : POCurrent Utilization Record format . . . : U Used pages . . . . : 12 Record length . . . : 0 % Utilized . . . . : 1 Block size . . . . : 0 Number of members . : 3 1st extent cylinders: 1 Secondary cylinders : 1 Data set name type : HFS Can anybody explain why it shows 92 cylinders and 92 extents under current allocation? John, When did you create it? Is it possible you really allocated it with 1,1 and it grew (yes, I can see it is not utilized at the moment)? Did you allocate it via ISPF or batch? Can you re-create the problem? Can you copy it to a newly allocated HFS? Think I figured it out: Apparently one user either forgot to allocate/mount his private HFS or misread my instructions to do so. Anyway, he did a bunch of stuff that used a lot of space, then cleaned up the mess. Not a really big deal, since it's on the sandbox. That's the catch-22 with secondaries. They are good because you don't want to abend applications / users, but then you don't want the situation you have either. At least you can use an ISPF FREE UNUSED SPACE command with PS, PO and PO-E. You need to reallocate / copy the HFS to free up the space or use something like Innovation's COMPAKTOR. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: License keys for ISV products
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Charles Mills Sent: Friday, February 16, 2007 2:40 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: License keys for ISV products SNIP ...The poor salesman would not know what to do, and the free trial would drag on and on and on. Our average 30-day trial went from about 180 days to 90 days when we added an expiration date, and that was a good thing. Also, when we added checking to our product, an amazing number of customers surfaced who had no idea that group was running your product on that box. Yes, our licensing worked so that the serial number check was not totally hard. The product would run on any serial number with a warning. I am fully aware of the what if we have a disaster at dark oh thirty and are up to our butts in alligators without having to track you down for a key? issue. SNIP Amen. And for those who bought the product, it is not all that hard to give them a key that works with no expiration. Or if they buy the source... And a NDA with teeth covers the rest of the What if's by the sales people. Later, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
On 16 Feb 2007 11:46:48 -0800, in bit.listserv.ibm-main you wrote: On Fri, 16 Feb 2007 19:05:30 +, Dave Salt [EMAIL PROTECTED] wrote: From: Mark Zelden [EMAIL PROTECTED] There is no reason you can't create your own defaults and use them (be it the only assembled table or the new keyword table / ISPCCONF. I was doing it for years when I consulted full time. You just need to make sure your module is in ISPLLIB or in ISPLLIB ahead of the one a sysprog may have created (or use TSOLIB prior to ISPF invocation). I could have used that back when my userid kept changing, but these days I've had the same ID for years and it probably won't change. Still, it's useful to know about so thanks for sharing it. I just tried ISPCCONF, but got command not found. I'll have to look into it. Thanks again, Same userid or not, there are other things that the defaults module controls that you can't override. For example SETUNDO STG. Of course now I'm perhaps spreading information to people that shouldn't really be changing this stuff. I hope no one from our general user population reads IBM-MAIN. :-) Too late. I recognize two of our posters as fellow posters to comp.lang.cobol. In addition IBM makes all of the need manuals available free of charge online. Anyway, ISPCCONF is in hlq.SISPEXEC along with some SCLM execs and some other goodies like ISRFIND, ISREPDF, ISRBPDF and ISPMLIST. Mark -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: License keys for ISV products
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Imbriale, Donald (Exchange) Sent: Friday, February 16, 2007 2:09 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: License keys for ISV products I am not a developer - but please don't do it. Products with built-in license checking are a real PITA for customers. If you insist on doing this checking, make sure you have the ability to provide a universal license code that bypasses CPUid checking; your best customers will appreciate it. Don Imbriale CA's EKG code for disaster testing is fairly nice. The only problem we ran into this last time was that they didn't want to read the code over the phone (or so I was told 2nd hand). They wanted email or fax. Our email was unavailable and the fax machine at the dr site was messed up and not working for some reason. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
[EMAIL PROTECTED] (Thompson, Steve) writes: You mean, should your computer (laptop) be stolen, one could then boot using a LIVE Linux CD, and crack the wallet contents... Come to think of it, with a LIVE Linux CD, one can crack NTFS files used by Windows This is why in our pursuit of security, we make ourselves unsecure because of all the accounts we have that we have to have a userid and password for. And if kept in that wallet, once it is hacked, what damage could be done? Think about this for a moment. How many web sites require you to register before you can look at their content. This adds to the issue. How many use the same throw-away userid across as many junk sites/accounts as possible, but keep the same password as they use for their banking ids? While I may have said this backwards, I think you can see the point. Again, I do not have a solution because the things that I would have pointed out or pointed to have already been shown to not be so secure after all by others on IBM-Main. previous post in thread: http://www.garlic.com/~lynn/2007d.html#34 Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 so the issue discussed in these recent posts http://www.galric.com/~lynn/aadsm26.htm#35 Failure of PKI in messaging http://www.garlic.com/~lynn/aadsm26.htm#36 New Credit Cards May Leak Personal Information is to transition away from shared-secret paradigm http://www.garlic.com/~lynn/subintegrity.html#shared an issue with (static data) shared-secret paradigm is that the same value is used to both originate/authenticate as well as to verify. this also leads to requirement that each unique security domain requires unique shared-secret as countermeasure to cross-domain attacks. in public key paradigm, the value to originate an authentication is different than the value to verify an authentication. also the value being verified can be made unique for every use ... as countermeasure to evesdropping and replay attacks. the private key can be made sufficiently complex that it effectively negates bute-force guessing attacks. so threat/attack vector then starts focusing on (unauthorized) accessing (possibly single) private key. for some drift, archeological ('81) reference to public key proposal http://www.garlic.com/~lynn/2006w.html#email810515 more secure communication over the network and old ('84) april 1st corporate directive password guideline proposal http://www.garlic.com/~lynn/2001d.html#52 OT Re: A beautiful morning in AFM. http://www.garlic.com/~lynn/2001d.html#53 April Fools Day -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
Of course now I'm perhaps spreading information to people that shouldn't really be changing this stuff. I hope no one from our general user population reads IBM-MAIN. :-) Now you've done it! I am a mere application programmer and, thanks to you, I've started to tinker with ISPCCONF! Bwa ha ha ha! Be afraid.* :-) * Not really. Since I am a mere application programmer, I can only shoot *myself* in the foot. There have been times that I've been thankful for that. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting PDF doing the rounds
On Fri, 2007-02-16 at 11:03 -0500, Ed Finnell wrote: I'll dig around, all I know is where it isn't. Speaking for Eric??? So Ed, now that you mention it, how is Eric these days ??? :0) Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
K E,1 Alternatives
Hi everyone. I recently suffered a console flood caused by the RACFDS running out of space. This is an ADCD z/OS 1.5 system. The out of space condition appears to have occurred due to an oddity in how DB2 archive logs were RACF protected. Each dataset Db2 created caused RACF to create a matching RACF profile. The dataset names of course have Date and Time in them so are unique. It appears to have taken 5.5 years to blow out RACF. I deleted the existing profile and created a generic profile which appears to not cause the problem. Oh, I also deleted all the old profiles. My actual question has to do with the control operator command. On this system, the only form of it that appears to work is K E,1 (delete 1 message). K E,1,10 - according to the Command Reference manual should delete the first 10 action messages; but it gets rejected due to 'invalid range'. My fingers got tired repeating k e,1 for every IRR405I that got generated. Is this correct that only K E,1 should work? Is there a better procedure than this for dealing with the flood, short of punching out and reipling? Will Daiske survive Yankee Stadium? Thanks. Edward Long -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting PDF doing the rounds
In a message dated 2/16/2007 3:38:32 P.M. Central Standard Time, [EMAIL PROTECTED] writes: So Ed, now that you mention it, how is Eric these days ??? :0) F.A.C -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: K E,1 Alternatives
Ed Long The operators of POLITEC(CEF) reply the command to clear a msg of display as a below: K C,A,1-99 Best regards Jorge Arueira Campos CAIXA EONCOMICA FEDERAL - SÃO PAULO - BRAZIL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: K E,1 Alternatives
On my sandbox, I'd K S,DEL=R,RTME=1/4 Bob Ed Long wrote: Hi everyone. I recently suffered a console flood caused by the RACFDS running out of space. This is an ADCD z/OS 1.5 system. The out of space condition appears to have occurred due to an oddity in how DB2 archive logs were RACF protected. Each dataset Db2 created caused RACF to create a matching RACF profile. The dataset names of course have Date and Time in them so are unique. It appears to have taken 5.5 years to blow out RACF. I deleted the existing profile and created a generic profile which appears to not cause the problem. Oh, I also deleted all the old profiles. My actual question has to do with the control operator command. On this system, the only form of it that appears to work is K E,1 (delete 1 message). K E,1,10 - according to the Command Reference manual should delete the first 10 action messages; but it gets rejected due to 'invalid range'. My fingers got tired repeating k e,1 for every IRR405I that got generated. Is this correct that only K E,1 should work? Is there a better procedure than this for dealing with the flood, short of punching out and reipling? Will Daiske survive Yankee Stadium? Thanks. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: License keys for ISV products
On Fri, 16 Feb 2007 12:40:12 -0800, Charles Mills [EMAIL PROTECTED] wrote: I have a lot of experience as a mainframe software vendor. I totally understand what you are saying. The other side of the coin is that some customers abuse software vendors. At my former company, we had several of what we called the trial from h---. A prospect would run a trial forever, with excuses like my boss is in a bad mood, I'm not going to bring a license in there for him to sign today. If the salesman after months and months of exasperation threatened to send him a legal letter, he would say I can tell you if you do that we'll never buy your product. The poor salesman would not know what to do, and the free trial would drag on and on and on. Our average 30-day trial went from about 180 days to 90 days when we added an expiration date, and that was a good thing. Also, when we added checking to our product, an amazing number of customers surfaced who had no idea that group was running your product on that box. Yes, our licensing worked so that the serial number check was not totally hard. The product would run on any serial number with a warning. I am fully aware of the what if we have a disaster at dark oh thirty and are up to our butts in alligators without having to track you down for a key? issue. Charles Do not take this personnaly But we don't care ( sorry about that ) about the sharks robbing the poor salesmen We all agree to trials with an expiring key . But once we have a contract , i do not accept to be taken hostage by a key with a serial number . It took me 5 hours to replace 2 z/990 by 2 x z9 but it has taken 3 weeks of my time ( and it is not over ) to get keys for various product . I have thrown one vendor for this , and i got a 'géneric key for another . I also decided to replace a second product before april by one without keys These Keys are part of the reasons we choose HSM ,RMM ,TWS ,RACF or SCLM or any IBM ( or other) product , because we never need keys . And some ISV do give us generic keys , so no excuses really . Bruno Bruno(dot)sugliani(at)groupemornay(dot)asso(dot)fr -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: K E,1 Alternatives
On Fri, 2007-02-16 at 13:54 -0800, Ed Long wrote: Is this correct that only K E,1 should work? Is there a better procedure than this for dealing with the flood, short of punching out and reipling? K A,NONE Followed by, K S,DEL=R Note that *ALL* highlighted will now scroll. The ACDC set-up was reminiscent of days gone by. Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: K E,1 Alternatives
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Ed Long Sent: Friday, February 16, 2007 3:54 PM To: IBM-MAIN@BAMA.UA.EDU Subject: K E,1 Alternatives Hi everyone. I recently suffered a console flood caused by the RACFDS running out of space. This is an ADCD z/OS 1.5 system. The out of space condition appears to have occurred due to an oddity in how DB2 archive logs were RACF protected. Each dataset Db2 created caused RACF to create a matching RACF profile. The dataset names of course have Date and Time in them so are unique. It appears to have taken 5.5 years to blow out RACF. I deleted the existing profile and created a generic profile which appears to not cause the problem. Oh, I also deleted all the old profiles. My actual question has to do with the control operator command. On this system, the only form of it that appears to work is K E,1 (delete 1 message). K E,1,10 - according to the Command Reference manual should delete the first 10 action messages; but it gets rejected due to 'invalid range'. My fingers got tired repeating k e,1 for every IRR405I that got generated. Is this correct that only K E,1 should work? Is there a better procedure than this for dealing with the flood, short of punching out and reipling? Will Daiske survive Yankee Stadium? Thanks. Edward Long What is wrong with: K S,DEL=R to put the console in ROLL mode? K Q,L=nn is nice if there are a lot of messages queued to a console which is not close by. That requeues all the messages into the SYSLOG and off the console in question. Also, you can: K N,PFK=(1,CMD='K E,1'),CON=N then just keep pressing the PF1 key. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: K E,1 Alternatives
With this command below all msgs of console display will be deleted included a action msg, is not good because many actions of msgs are lost. K S,DEL=R,RTME=1/4 On 2/16/07, Bob Rutledge [EMAIL PROTECTED] wrote: On my sandbox, I'd K S,DEL=R,RTME=1/4 Bob Ed Long wrote: Hi everyone. I recently suffered a console flood caused by the RACFDS running out of space. This is an ADCD z/OS 1.5 system. The out of space condition appears to have occurred due to an oddity in how DB2 archive logs were RACF protected. Each dataset Db2 created caused RACF to create a matching RACF profile. The dataset names of course have Date and Time in them so are unique. It appears to have taken 5.5 years to blow out RACF. I deleted the existing profile and created a generic profile which appears to not cause the problem. Oh, I also deleted all the old profiles. My actual question has to do with the control operator command. On this system, the only form of it that appears to work is K E,1 (delete 1 message). K E,1,10 - according to the Command Reference manual should delete the first 10 action messages; but it gets rejected due to 'invalid range'. My fingers got tired repeating k e,1 for every IRR405I that got generated. Is this correct that only K E,1 should work? Is there a better procedure than this for dealing with the flood, short of punching out and reipling? Will Daiske survive Yankee Stadium? Thanks. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: JES2 CMD truncation
I goofed the value, JES2 truncated the bad part, and proceeded to purge ALL output In 1981, $PQ was a valid (and dangerous) JES2 command. I know: I issued it once (truncation problem). Now, $PQ is invalid. You have to have an argument. To do what I did in 1981, you now have to issue $PQ,ALL (or whatever it is with the new syntax). So, at least it's not accidental. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Java issue
I've been here before, but can't find my notes or the right reference in the archives. When I run a simple, small Java app, I get this message: JVMDBG001: malloc failed to allocate 7553024 bytes, ... Then the app runs. But I'm sure for a more complex app this will be a problem. And besides, I hate to have messages hanging around. Can anyone point me to the place to change parameters (and which ones to change) to eliminate this? TIA. Kind regards, -Steve Comstock The Trainer's Friend, Inc. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
What if the ISPF user sets their primary and secondary LOG pages both to zero, no log? IT is sometimes just the task of finding the correct wrench to drive in the proper nail. Using the ISPF log as a security tool is such a task. RACF can authenticate. SMF can journal. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Wow. More Java woes
Now I tried a simple compile. And the messages are heavier (not surprising): JVMDBG001: malloc failed to allocate 7553024 bytes, time: Fri Feb 16 14:21:29 2007 JVMDBG001: malloc failed to allocate 7553024 bytes, time: Fri Feb 16 14:21:48 2007 JVMDBG001: malloc failed to allocate 100016 bytes, time: Fri Feb 16 14:22:03 2007 **Out of memory, aborting** *** panic: JVMCL052: Cannot allocate memory in initializeHeap for heap segment JVMDG217: Dump Handler is Processing Signal 3 - Please Wait. JVMHP002: JVM requesting System Transaction Dump JVMHP012: System Transaction Dump written to SCOMSTO.JVM.TDUMP.SCOMSTO6.D070216.T142203 JVMDBG001: malloc failed to allocate 2621440 bytes, ... JVMDBG001: malloc failed to allocate 2097152 bytes, ... JVMDBG001: malloc failed to allocate 1572864 bytes, ... JVMDBG001: malloc failed to allocate 1048576 bytes, ... JVMDBG001: malloc failed to allocate 524288 bytes, ... JVMDG305: Java core not written, unable to allocate memory for print buffer. JVMDG215: Dump Handler has Processed Error Signal 3. CEE5207E The signal SIGABRT was received. [1] + Done(131) javac Worker.java 83951984 Abort /usr/lpp/java/J1.4/bin/javac This is the first time I've really paid attention to java since we installed z/OS 1.7, so some parameter or other obiously didn't get carried over. All suggestions taken seriously. Well, ya' know. Kind regards, -Steve Comstock -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Java issue
IIRC, you should check the MAXASSIZE from BPXPRM00 or the ASSIZEMAX for the user in question. Those should control the region values. Also, exit IEFUSI shouldn't be altering region values for OMVS work, Bill On Fri, 16 Feb 2007 15:35:04 -0700, Steve Comstock [EMAIL PROTECTED] wrote: I've been here before, but can't find my notes or the right reference in the archives. When I run a simple, small Java app, I get this message: JVMDBG001: malloc failed to allocate 7553024 bytes, ... Then the app runs. But I'm sure for a more complex app this will be a problem. And besides, I hate to have messages hanging around. Can anyone point me to the place to change parameters (and which ones to change) to eliminate this? TIA. Kind regards, -Steve Comstock The Trainer's Friend, Inc. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Aux shortage - can't shut down
Uh-oh. Now I'm in trouble. Can't logon: address space creation failed. On the console, this message: AUXILIARY STORAGE SHORTAGE Attempts to start our shutdown procedure are aborted. Any suggestions? -- -Steve Comstock -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Aux shortage - can't shut down
Attempts to start our shutdown procedure are aborted. Any suggestions? If you have spare PageDSNs it's time for a PAGEADD (PA) or two. Otherwise, start cancelling non-critical until you get an AUX STG RELIEVED message. Then create and add page DSNs. Update IEASYSxx to point to the new ones, and re-IPL if/when you can. Then use the TYPE30 SMF records to find your big hitters. If it is a one time occurance you may be able to remove the page dsns, but I wouldn't bother. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Aux shortage - can't shut down- solved
Steve Comstock wrote: Uh-oh. Now I'm in trouble. Can't logon: address space creation failed. On the console, this message: AUXILIARY STORAGE SHORTAGE Attempts to start our shutdown procedure are aborted. Any suggestions? repyling to my own post. Got it. We're shutting down OK now. -Steve -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: JES2 CMD truncation
In a recent note, Mark H. Young said: Date: Fri, 16 Feb 2007 14:05:49 -0600 Remember in the old days when issuing a JES2 command, if you had invalid extra parms on the command string, JES2 would just ignore the invalid stuff, truncate it and issue the part of the command that WAS correct? Does it still work that way, or did IBM fix that added feature some time ago? Seems like I got clobbered a time or two by that when issuing a command to delete output that was say 4 days old or older (the entire queue). I goofed the value, JES2 truncated the bad part, and proceeded to purge ALL output.even from 2 minutes ago. Quiet truncation should never, never, never be allowed. -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
New Level of Dataset Audit Facility (DAF) is Coming Soon
Greetings, I am working to finalize another level of DAF. Changes so far since DAF 1.4.7 include: Add keyword DEVADDR Add keyword DEVTYPE Add SMF Record Type 21 support Add SMF Record Type 90 Subtype 01 support Add SMF Record Type 90 Subtype 02 support Add SMF Record Type 90 Subtype 08 support Add SMF Record Type 92 Subtype 11 support Add Virtual SMF Records 001 001 - Virtual APFLST 001 002 - Virtual LNKLST 001 003 - Virtual LOADPARM 001 004 - Virtual LPALST 001 005 - Virtual Master Catalog 001 006 - Virtual PAGE 001 007 - Virtual PARMLIB 001 008 - Virtual RACF 001 009 - Virtual UADS Change DAFSMF QSAM to BUFNO=200 Change DAFSMF VSAM to BUFND=200 RMODE31=BUFF Correct DAF014/15 Correct DASD/TAPE Correct DAF014/15 Process PDSE Statistics Type Correct DAF045 JESx Completion Codes Correct DAF064 No Extent Information Correct DAF080 Jobname UNKNOWN when hex zeroes Correct DAF081 Process All Datasets Correct DAF082 S021 Multiple Errors Correct DAF088 S001 Missing Lengths Correct DAF118 Check FTP Command Validity Correct DAF8XR Display PERMIT ACCESS and ID Correct DAFCSP Test For Comments Correct NFTP S034 Skip If Nothing To Process Enhance numerous SMF Record Types Let me know if you can think of anything else. Cheers... Michael Now that's room service! Choose from over 150,000 hotels in 45,000 destinations on Yahoo! Travel to find your fit. http://farechase.yahoo.com/promo-generic-14795097 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: K E,1 Alternatives
1. It's a sandbox system. 2. Nobody watches its console. 3. Messages aren't lost as long as SDSF is among the living. 4. If it gets to the point that it annoys me, I'll take 10 minutes and hack out an MPF exit to deal with it. Bob Jorge Arueira Campos wrote: With this command below all msgs of console display will be deleted included a action msg, is not good because many actions of msgs are lost. K S,DEL=R,RTME=1/4 On 2/16/07, Bob Rutledge [EMAIL PROTECTED] wrote: On my sandbox, I'd K S,DEL=R,RTME=1/4 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: License keys for ISV products
On Feb 16, 2007, at 2:40 PM, Charles Mills wrote: I have a lot of experience as a mainframe software vendor. I totally understand what you are saying. The other side of the coin is that some customers abuse software vendors. At my former company, we had several of what we called the trial from h---. A prospect would run a trial forever, with excuses like my boss is in a bad mood, I'm not going to bring a license in there for him to sign today. If the salesman after months and months of exasperation threatened to send him a legal letter, he would say I can tell you if you do that we'll never buy your product. The poor salesman would not know what to do, and the free trial would drag on and on and on. Our average 30-day trial went from about 180 days to 90 days when we added an expiration date, and that was a good thing. ---snip-- Charles I have seen examples of good/bad ISV's and also bad customers. Yes I have seen customers steal software, yes I reported it to management and was promptly ignored. I don't know if there is a good answer to the issue myself. I would prefer (personally) that any solution would be dynamic, ie no recompiles, change of passwords nor require IPL's or have any impact to the system (like stopping an address space) . If it can be accomplished with the above conditions I am perfectly happy with serial numbers. Ed -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html