Options available to execution techniques


Pointer Checker

 offers several execution techniques. The following table explains each processing technique that is available.

The following table indicates which processing options are valid for use by each technique.

Technique

Description

Hash & Utility

The option is valid when you execute the Hash Checking technique under another utility. See Executing-hash-checking-under-IMAGE-COPY-PLUS for more information.

SA Hash

The option is valid when you execute the Hash Checking technique as a stand-alone utility, as described in Executing-hash-checking-as-a-stand-alone-utility.

Full Check

The option is valid when you execute the Full Checking technique, as described in Executing-the-Full-Checking-technique.




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC AMI Pointer Checker for IMS 5.1