• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • OS/400 Alert: iSeries Movies, Tools, and More

    April 14, 2004 Shannon O'Donnell

    If you’ve ever wondered what IBM would do if it had a really great computing platform, a video camera, and a budget of at least six dollars, then have we got some great news for you! IBM has gotten into the movie business by releasing a series of videos showcasing the reliability of the venerable iSeries. Also in this issue, we alert you to a free study offered by IBM that might help you convince management to consolidate all those Linux and Intel-based servers onto the iSeries.

    A NEW TOOL TO PROMOTE THE ISERIES

    Being an iSeries professional, you know you’re fighting an uphill battle when trying to convince Windows and Linux users of the merits of moving to the iSeries platform. For many, the idea of a fully consolidated database and hardware oriented security just does not well with what they are used to from their Windows and Linux worlds. So what is an IT professional to do? IBM may have just the solution you need to convince those who hold the purse strings that the IBM’s integrated platform and its ability to consolidate Linux and Intel-based servers.

    IBM’s new program, IT Optimization CDAT (consolidation, discovery, and analysis tool) is a software analysis tool designed to measure not only network traffic but also the performance of a network’s Intel and Linux servers. When complete this analysis is designed to convince those who need convincing that the iSeries is the correct solution for consolidating or replacing your organization’s Windows and Linux servers. How do you get started? You “nominate” your organization for one of these “free” analysis surveys from IBM. Once accepted, IBM will dispatch the appropriate personnel to your site to perform the analysis and work with your organization. More information can be found on IBM’s Web site.

    ISERIES VIDEOS: RELIABILITY IN ACTION

    Now starring in a movie near you…the iSeries! It had to happen. First there was Chuck Norris in all those Vietnam movies in the ’80s. In the ’90s it was Bruce Willis in action-packed movies like Die Hard, and Day of the Jackal. IBM felt it was time for the iSeries to take a starring role in a series of new action videos. Yes, strange as it sounds, IBM has put together a series of videos that attempt to portray the iSeries as a dynamic, action-packed computing platform. If you are interested in viewing “The Legend of iSeries” videos, such as “Tornado,” the gripping story of the iSeries facing off against that scourge of the Midwest, the twister, then head on over to IBM’s Web site and get ready for some action. Don’t forget the popcorn.

    THIS WEEK’S NASTY WINDOWS WORRIES

    The following information is from www.symantec.com.

    Please participate in our iSeries programming survey at
    http://www.surveymonkey.com/s.asp?u=74193419903

    MP3Concept is a proof-of-concept Trojan targeted at the Mac OS X platform that is currently not seen “in the wild.” It is not spreading or infecting Mac users. The proof-of-concept program does not contain any malicious payload, such as viral code, the ability to e-mail itself, or perform destructive functions like deleting files. It only contains code to display a message box and mp3 audio data of a man laughing.

    W32.HLLW.Donk.M is a network-aware worm. It attempts to connect to a predetermined IRC server to get instructions from the attacker.

    W32.Gaobot.YN is a variant of W32.HLLW.Gaobot.gen that attempts to spread to network shares and allows access to an infected computer through an IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; and the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80.

    W32.Gaobot.YC is a variant of W32.HLLW.Gaobot.gen that attempts to spread to network shares and allows access to an infected computer through an IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; and the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80.

    W32.Netsky.U@mm is a mass-mailing worm and a variant of W32.Netsky.S@mm. This worm also contains back-door functionality and may perform a denial-of-service attack against predetermined Web sites. The subject line and attachment name will vary. The attachment will have a .pif file extension.

    Trojan.Mitglieder.H is a minor variant of Trojan.Mitglieder. This Trojan horse opens a proxy on your system that allows it to relay e-mail. It can update or uninstall itself. Unlike its previous variants, Trojan.Mitglieder.H does not try to stop security software.

    W32.Gaobot.WO is a variant of W32.Gaobot.gen. It attempts to spread through network shares that have weak passwords. It also allows attackers to access an infected computer through a predetermined IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80; and the workstation service buffer overrun vulnerability (described in Microsoft Security Bulletin MS03-049), using TCP port 445.

    W32.Tunk.A is a file-prepending virus. Infected systems may fail to restart from May 2004 onward.

    Backdoor.Nibu.D is a multi-threaded Trojan horse that opens a back door, runs a key logger, and attempts to steal personal information.

    PTF’S AND FIXES FOR OS/400 AND RELATED PROGRAMS

    IBM released the latest cumulative package for V5R2 customers on March 29.

    The latest HIPER package was released March 16.

    The Database Group PTF was updated February 26.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Manta Technologies

    The Leader in IBM i Education!
    Need training on anything i?
    Manta is all you need.

    Spring Sale! Save 20% off any Manta Combination Package, including the complete IBM i Training Library. Now through April 30.

    130 courses and competency exams on:
    · IBM i operations
    · System Management and Security
    · IBM i Programming Tools
    · Programming in RPG, COBOL, CL, Java
    · Web Development
    · SQL, DB2, Query

    Product features:
    · Runs in every popular browser
    · Available 24/7/365
    · Free Student Reference Guides
    · Free Student Administration
    · Concurrent User License
    · Built-In IBM i Simulator

    You can download our 200-page catalog and take sample sessions at MantaTech.com.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Ricoh Printers Get Better iSeries Connectivity with WCO Power5 OS/400 Servers to Ship by End of June

    Leave a Reply Cancel reply

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • LANSA Developing Business Intelligence Tool
  • Blazing The Trail For VTL In The Cloud
  • Data De-Dupe Gives VTL Customers More Options
  • Four Hundred Monitor, March 29
  • The Big Spending On IT Security Is Only Going To Get Bigger
  • IBM Tweaks Some Power Systems Prices Down, Others Up
  • Disaster Recovery: From OS/400 V5R3 To IBM i 7.4 In 36 Hours
  • The Disconnect In Modernization Planning And Execution
  • Superior Support: One Of The Reasons You Pay The Power Systems Premium
  • IBM i PTF Guide, Volume 25, Number 13

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle