|
sas wrote: > Does anybody has any experience to exploit an Non Observable Program ? > When we remove the observablity by CHGPGM ( RMVOBS *all ) , is it just replace > the the Flag observablity to no , or delete some observality information ? Dear sas: With the observability removed, three things happen: 1. The program becomes significantly smaller, 2. It becomes impossible to port the program between CISC and RISC hardware, and 3. The program becomes somewhat harder for hackers to disassemble. -- James H. H. Lampert Professional Dilettante http://www.hb.quik.com/jamesl http://members.hostedscripts.com/antispam.html http://www.thehungersite.com Help America's Passenger Trains. http://www.saveamtrak.org Read My Lips: No More Atrocities!
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.