In <[email protected]>, on
03/16/2015
at 04:52 PM, Paul Gilmartin
<[email protected]> said:
>I don't think so; if I were to relink IEBCOPY with AC(1) into an
>authorized library, it would work equally well when called from an
>unauthorized program.
What did you mean by "changing IEBCOPY from AC(1) to AC(0)"; I took it
to mean not only relinking but changing the code so that it would
work. If you were only talking about changing the AC after the code
was already changed, then the answer is still obvious: the principle
of least privilege.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN