• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • OS/400 Alert: Have You Been Snarfed?

    March 3, 2004 Shannon O'Donnell

    Just when you thought it was safe to talk on your cell phone, along comes a new form of hacking targeted specifically at these devices. Hacking into cell phones or other Bluetooth-ready devices, known in the industry as “snarfing,” has just gotten a whole lot easier. Speaking of easy, are you are looking for a way to remove any of those nasty Windows viruses making the rounds these days? I’ll tell you where to find the tools you need to target specific viruses.

    SNARFING

    Despite its name, snarfing has nothing to do with the Smurfs. Nor is it something you do when you have a really messy sneeze. Bluesnarfing is the hijacking of Bluetooth-enabled cell phones in order to steal personal information. Snarfing allows an unauthorized person to log on to your Bluetooth-enabled device without your being aware of it. The hacker then has access to all of your personal information, such as your address book. Several Bluetooth-enabled devices, including many from Nokia and Sony, are vulnerable to this type of attck. For more information on bluesnarfing and other Bluetooth-related vulnerabilities, go to www.bluestumbler.org.

    VIRUS REMOVAL TOOLS

    If you have been infected by a virus, chances are that despite your best efforts to remove it, your computer is still infected. That’s because viruses are typically not found in a single repository on your PC. Instead, they are scattered all over your hard drive, inside your Windows Registry and in dozens of places you would never think to look. The only sure way to remove such a beast is by using a virus removal tool designed by experts specifically for that virus. You can find such a tool for all the latest and greatest viruses on Symantec’s Web site.

    THIS WEEK’S NASTY WINDOWS WORRIES

    Backdoor.IRC.Loonbot is a Trojan horse that has backdoor capabilities. It can allow an attacker to remotely control your computer using Internet Relay Chat (IRC). This Trojan can also download and execute files. This threat is written in C and is packed with AsPack Version 2.12.

    PWSteal.Tarno.B is a Trojan Horse that attempts to intercept user names and passwords and other computer information. It sends the user names and passwords to a certain e-mail address, using its own SMTP engine.

    W32.Mockbot.A.Worm is a worm that spreads using computers infected with the W32.Mydoom.A@mm, W32.Blaster.Worm, and Backdoor.Optix worms. To spread itself, the worm can also exploit the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), as well as a vulnerability in the DameWare Mini Remote Control program.

    Backdoor.IRC.Aladinz.M is a backdoor Trojan horse that uses malicious scripts in the mIRC client software, allowing unauthorized remote access.

    W32.Netsky.C@mm is a mass-mailing worm that uses its own SMTP engine to send itself to the e-mail addresses it finds when scanning hard drives and mapped drives. This worm also searches drives C through Y for the folder names containing “shar” and then copies itself to those folders. The subject, body, and e-mail attachment vary.

    W32.Bizex.Worm is a worm that spreads by sending an ICQ message to all the contacts in a user’s ICQ contact list that contains a link. The link opens an Internet Explorer window and links to an HTML file that exploits a vulnerability in an Internet Explorer function. This worm has several components that can be downloaded by clicking the link.

    For more information on the latest virus threats, go to www.symantec.com.

    IBM MANUALS ONLINE

    Looking for a specific IBM manual but don’t know where to go? IBM maintains a list of online manuals for V5R2. You can find the answers to any of the operational or programming problems that are keeping you from performing your job.

    PTF’S AND FIXES FOR OS/400 AND RELATED PROGRAMS

    IBM released the latest cumulative package for V5R2 customers on January 21.

    The latest HIPER package was released on February 18.

    The Database Group PTF was updated on February 26.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    PeopleSoft Announces RFID Software As Target Issues Mandate IBM Unveils iSeries.mySeries Marketing Campaign

    Leave a Reply Cancel reply

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle