How is using a field for what it is intended for abuse? And how is N/T easier?


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3

________________________________________
From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Steve Smith [sasd...@gmail.com]
Sent: Monday, July 20, 2020 8:43 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Using AN EAX value of PC Routineto index into the Authority Table

Have you never heard of Name/Token Services?  It's much easier than abusing
the SSI, and much more efficient.

sas

On Mon, Jul 20, 2020 at 8:29 AM Seymour J Metz <sme...@gmu.edu> wrote:

> If the server creates a system LX, how does the client locate it? Of those
> ways, which is easiest?
>
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to