On Mon, 16 Mar 2015 16:49:26 -0400, Shmuel Metz (Seymour J.) wrote: > > at 12:53 PM, Paul Gilmartin said: > >>is now impacted in that calling IEBCOPY causes his program to lose >>authorization/ ABEND/whatever. > >Not even close. > Read the thread. Walt already corrected me on that, and I accepted the correction.'
On Mon, 16 Mar 2015 16:47:52 -0400, Shmuel Metz (Seymour J.) wrote: > >>Also, what benefit comes from changing IEBCOPY from AC(1) to AC(0)? > >The obvious one: it will work when invoked by an unauthorized program. > I don't think so; if I were to relink IEBCOPY with AC(1) into an authorized library, it would work equally well when called from an unauthorized program. -- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
