• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Proper Use of QTEMP

    June 5, 2002 Timothy Prickett Morgan

    Hey, Ted:

    In the article, “Suggestions for a Temporary Library,” the author writes the following statement: “…the top of the library list. QTEMP is already there.”


    So many sites put QTEMP at the top of the library list to save qualifying file names with QTEMP. I have always felt that this exposes a potential security risk. This is mainly for reasons that might never happen, but, if damage can be done, some day it is bound to happen. For example, a user using Query/400 could easily create a file in QTEMP that has the same name as a file elsewhere in the library list. A subsequent program might reference the file in QTEMP rather than the one it should. Subsequent scenarios range from a harmless program crash to accidental or even deliberate file corruption.

    To get around this, I suggest that QTEMP should ALWAYS be placed at the bottom of the library list and that references to files in QTEMP should ALWAYS be hard coded.

    — Tony

    Sponsored By
    looksoftware

    Application Modernization made Easy!

    newlook allows you to rapidly re-face, web-enable, and extend your applications.

    And, newlook will integrate your iSeries applications with desktop applications like Notes, Excel,
    Word and Outlook in hours!

    Add file transfer, DDM, display and printer emulation using secure browser-based deployment and move to
    a new future with newlook.

    Download your FREE evaluation at www.looksoftware.com/down_main.htm
    and request a personal web-cast to see how easily newlook can rejuvenate your applications.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mgo_rc, Volume 2, Number 43 -- June 5, 2002

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Using Library Lists for JDBC File Access Printing Leading Zeros with Query/400

    Leave a Reply Cancel reply

MGO Volume: 2 Issue: 43

This Issue Sponsored By

    Table of Contents

    • Proper Use of QTEMP
    • Build SQL to Define Your Existing Files
    • Making PC5250 Look like a Dumb Terminal

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Liam Allan Shares What’s Coming Next With Code For IBM i
    • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
    • VS Code Will Be The Heart Of The Modern IBM i Platform
    • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
    • IBM i PTF Guide, Volume 27, Number 25
    • Meet The Next Gen Of IBMers Helping To Build IBM i
    • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
    • Will Independent IBM i Clouds Survive PowerVS?
    • Now, IBM Is Jacking Up Hardware Maintenance Prices
    • IBM i PTF Guide, Volume 27, Number 24

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle