• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Proper Use of QTEMP

    June 5, 2002 Timothy Prickett Morgan

    Hey, Ted:

    In the article, “Suggestions for a Temporary Library,” the author writes the following statement: “…the top of the library list. QTEMP is already there.”


    So many sites put QTEMP at the top of the library list to save qualifying file names with QTEMP. I have always felt that this exposes a potential security risk. This is mainly for reasons that might never happen, but, if damage can be done, some day it is bound to happen. For example, a user using Query/400 could easily create a file in QTEMP that has the same name as a file elsewhere in the library list. A subsequent program might reference the file in QTEMP rather than the one it should. Subsequent scenarios range from a harmless program crash to accidental or even deliberate file corruption.

    To get around this, I suggest that QTEMP should ALWAYS be placed at the bottom of the library list and that references to files in QTEMP should ALWAYS be hard coded.

    — Tony

    Sponsored By
    looksoftware

    Application Modernization made Easy!

    newlook allows you to rapidly re-face, web-enable, and extend your applications.

    And, newlook will integrate your iSeries applications with desktop applications like Notes, Excel,
    Word and Outlook in hours!

    Add file transfer, DDM, display and printer emulation using secure browser-based deployment and move to
    a new future with newlook.

    Download your FREE evaluation at www.looksoftware.com/down_main.htm
    and request a personal web-cast to see how easily newlook can rejuvenate your applications.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mgo_rc, Volume 2, Number 43 -- June 5, 2002

    Sponsored by
    Raz-Lee Security

    Protect Your IBM i and/or AIX Servers with a Free Virus Scan

    Cyber threats are a reality for every platform, including IBM i and AIX servers. No system is immune, and the best defense is prompt detection and removal of viruses to prevent costly damage. Regulatory standards across industries mandate antivirus protection – ensure your systems are compliant and secure.

    Get My Free Virus Scan

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Using Library Lists for JDBC File Access Printing Leading Zeros with Query/400

    Leave a Reply Cancel reply

MGO Volume: 2 Issue: 43

This Issue Sponsored By

    Table of Contents

    • Proper Use of QTEMP
    • Build SQL to Define Your Existing Files
    • Making PC5250 Look like a Dumb Terminal

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • POWERUp 2025 –Your Source For IBM i 7.6 Information
    • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
    • Guru: Creating An SQL Stored Procedure That Returns A Result Set
    • As I See It: At Any Cost
    • IBM i PTF Guide, Volume 27, Number 19
    • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
    • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
    • i-Rays Brings Observability To IBM i Performance Problems
    • Another Non-TR “Technology Refresh” Happens With IBM i TR6
    • IBM i PTF Guide, Volume 27, Number 18

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle