• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • OS/400 Alert: iSeries Movies, Tools, and More

    April 14, 2004 Shannon O'Donnell

    If you’ve ever wondered what IBM would do if it had a really great computing platform, a video camera, and a budget of at least six dollars, then have we got some great news for you! IBM has gotten into the movie business by releasing a series of videos showcasing the reliability of the venerable iSeries. Also in this issue, we alert you to a free study offered by IBM that might help you convince management to consolidate all those Linux and Intel-based servers onto the iSeries.

    A NEW TOOL TO PROMOTE THE ISERIES

    Being an iSeries professional, you know you’re fighting an uphill battle when trying to convince Windows and Linux users of the merits of moving to the iSeries platform. For many, the idea of a fully consolidated database and hardware oriented security just does not well with what they are used to from their Windows and Linux worlds. So what is an IT professional to do? IBM may have just the solution you need to convince those who hold the purse strings that the IBM’s integrated platform and its ability to consolidate Linux and Intel-based servers.

    IBM’s new program, IT Optimization CDAT (consolidation, discovery, and analysis tool) is a software analysis tool designed to measure not only network traffic but also the performance of a network’s Intel and Linux servers. When complete this analysis is designed to convince those who need convincing that the iSeries is the correct solution for consolidating or replacing your organization’s Windows and Linux servers. How do you get started? You “nominate” your organization for one of these “free” analysis surveys from IBM. Once accepted, IBM will dispatch the appropriate personnel to your site to perform the analysis and work with your organization. More information can be found on IBM’s Web site.

    ISERIES VIDEOS: RELIABILITY IN ACTION

    Now starring in a movie near you…the iSeries! It had to happen. First there was Chuck Norris in all those Vietnam movies in the ’80s. In the ’90s it was Bruce Willis in action-packed movies like Die Hard, and Day of the Jackal. IBM felt it was time for the iSeries to take a starring role in a series of new action videos. Yes, strange as it sounds, IBM has put together a series of videos that attempt to portray the iSeries as a dynamic, action-packed computing platform. If you are interested in viewing “The Legend of iSeries” videos, such as “Tornado,” the gripping story of the iSeries facing off against that scourge of the Midwest, the twister, then head on over to IBM’s Web site and get ready for some action. Don’t forget the popcorn.

    THIS WEEK’S NASTY WINDOWS WORRIES

    The following information is from www.symantec.com.

    Please participate in our iSeries programming survey at
    http://www.surveymonkey.com/s.asp?u=74193419903

    MP3Concept is a proof-of-concept Trojan targeted at the Mac OS X platform that is currently not seen “in the wild.” It is not spreading or infecting Mac users. The proof-of-concept program does not contain any malicious payload, such as viral code, the ability to e-mail itself, or perform destructive functions like deleting files. It only contains code to display a message box and mp3 audio data of a man laughing.

    W32.HLLW.Donk.M is a network-aware worm. It attempts to connect to a predetermined IRC server to get instructions from the attacker.

    W32.Gaobot.YN is a variant of W32.HLLW.Gaobot.gen that attempts to spread to network shares and allows access to an infected computer through an IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; and the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80.

    W32.Gaobot.YC is a variant of W32.HLLW.Gaobot.gen that attempts to spread to network shares and allows access to an infected computer through an IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; and the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80.

    W32.Netsky.U@mm is a mass-mailing worm and a variant of W32.Netsky.S@mm. This worm also contains back-door functionality and may perform a denial-of-service attack against predetermined Web sites. The subject line and attachment name will vary. The attachment will have a .pif file extension.

    Trojan.Mitglieder.H is a minor variant of Trojan.Mitglieder. This Trojan horse opens a proxy on your system that allows it to relay e-mail. It can update or uninstall itself. Unlike its previous variants, Trojan.Mitglieder.H does not try to stop security software.

    W32.Gaobot.WO is a variant of W32.Gaobot.gen. It attempts to spread through network shares that have weak passwords. It also allows attackers to access an infected computer through a predetermined IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80; and the workstation service buffer overrun vulnerability (described in Microsoft Security Bulletin MS03-049), using TCP port 445.

    W32.Tunk.A is a file-prepending virus. Infected systems may fail to restart from May 2004 onward.

    Backdoor.Nibu.D is a multi-threaded Trojan horse that opens a back door, runs a key logger, and attempts to steal personal information.

    PTF’S AND FIXES FOR OS/400 AND RELATED PROGRAMS

    IBM released the latest cumulative package for V5R2 customers on March 29.

    The latest HIPER package was released March 16.

    The Database Group PTF was updated February 26.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    VISUAL LANSA 16 WEBINAR

    Trying to balance stability and agility in your IBM i environment?

    Join this webinar and explore Visual LANSA 16 – our enhanced professional low-code platform designed to help organizations running on IBM i evolve seamlessly for what’s next.

    🎙️VISUAL LANSA 16 WEBINAR

    Break Monolithic IBM i Applications and Unlock New Value

    Explore modernization without rewriting. Decouple monolithic applications and extend their value through integration with modern services, web frameworks, and cloud technologies.

    🗓️ July 10, 2025

    ⏰ 9 AM – 10 AM CDT (4 PM to 5 PM CEST)

    See the webinar schedule in your time zone

    Register to join the webinar now

    What to Expect

    • Get to know Visual LANSA 16, its core features, latest enhancements, and use cases
    • Understand how you can transition to a MACH-aligned architecture to enable faster innovation
    • Discover native REST APIs, WebView2 support, cloud-ready Azure licensing, and more to help transform and scale your IBM i applications

    Read more about V16 here.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Ricoh Printers Get Better iSeries Connectivity with WCO Power5 OS/400 Servers to Ship by End of June

    Leave a Reply Cancel reply

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle