|
Joe, Joe, Joe,Dave, dave, dave/
It is a given in the rest of the relational world, especially the rest of the DB2s, that any access other than via SQL is a back door and considered a security problem.Please find a single reference that states that DB2's ISAM access is a security risk. Especially since every native I/O operations is subject to the same checks and security considerations that SQL access is subject to.
You might not want to admit it but it is true.Actually, you don't want to admit that you can't back up your statement with a single credible reference.
As to my credibility on this forum... not concerned. Either others are willing to consider they might be wrong and and I might be right or they are not. Argiments like this usually come from religious zealots who's experience is limited mostly to the i5 and have little or no experience in the other DB2 worlds.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.