• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • OS/400 Alert: iSeries Movies, Tools, and More

    April 14, 2004 Shannon O'Donnell

    If you’ve ever wondered what IBM would do if it had a really great computing platform, a video camera, and a budget of at least six dollars, then have we got some great news for you! IBM has gotten into the movie business by releasing a series of videos showcasing the reliability of the venerable iSeries. Also in this issue, we alert you to a free study offered by IBM that might help you convince management to consolidate all those Linux and Intel-based servers onto the iSeries.

    A NEW TOOL TO PROMOTE THE ISERIES

    Being an iSeries professional, you know you’re fighting an uphill battle when trying to convince Windows and Linux users of the merits of moving to the iSeries platform. For many, the idea of a fully consolidated database and hardware oriented security just does not well with what they are used to from their Windows and Linux worlds. So what is an IT professional to do? IBM may have just the solution you need to convince those who hold the purse strings that the IBM’s integrated platform and its ability to consolidate Linux and Intel-based servers.

    IBM’s new program, IT Optimization CDAT (consolidation, discovery, and analysis tool) is a software analysis tool designed to measure not only network traffic but also the performance of a network’s Intel and Linux servers. When complete this analysis is designed to convince those who need convincing that the iSeries is the correct solution for consolidating or replacing your organization’s Windows and Linux servers. How do you get started? You “nominate” your organization for one of these “free” analysis surveys from IBM. Once accepted, IBM will dispatch the appropriate personnel to your site to perform the analysis and work with your organization. More information can be found on IBM’s Web site.

    ISERIES VIDEOS: RELIABILITY IN ACTION

    Now starring in a movie near you…the iSeries! It had to happen. First there was Chuck Norris in all those Vietnam movies in the ’80s. In the ’90s it was Bruce Willis in action-packed movies like Die Hard, and Day of the Jackal. IBM felt it was time for the iSeries to take a starring role in a series of new action videos. Yes, strange as it sounds, IBM has put together a series of videos that attempt to portray the iSeries as a dynamic, action-packed computing platform. If you are interested in viewing “The Legend of iSeries” videos, such as “Tornado,” the gripping story of the iSeries facing off against that scourge of the Midwest, the twister, then head on over to IBM’s Web site and get ready for some action. Don’t forget the popcorn.

    THIS WEEK’S NASTY WINDOWS WORRIES

    The following information is from www.symantec.com.

    Please participate in our iSeries programming survey at
    http://www.surveymonkey.com/s.asp?u=74193419903

    MP3Concept is a proof-of-concept Trojan targeted at the Mac OS X platform that is currently not seen “in the wild.” It is not spreading or infecting Mac users. The proof-of-concept program does not contain any malicious payload, such as viral code, the ability to e-mail itself, or perform destructive functions like deleting files. It only contains code to display a message box and mp3 audio data of a man laughing.

    W32.HLLW.Donk.M is a network-aware worm. It attempts to connect to a predetermined IRC server to get instructions from the attacker.

    W32.Gaobot.YN is a variant of W32.HLLW.Gaobot.gen that attempts to spread to network shares and allows access to an infected computer through an IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; and the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80.

    W32.Gaobot.YC is a variant of W32.HLLW.Gaobot.gen that attempts to spread to network shares and allows access to an infected computer through an IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; and the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80.

    W32.Netsky.U@mm is a mass-mailing worm and a variant of W32.Netsky.S@mm. This worm also contains back-door functionality and may perform a denial-of-service attack against predetermined Web sites. The subject line and attachment name will vary. The attachment will have a .pif file extension.

    Trojan.Mitglieder.H is a minor variant of Trojan.Mitglieder. This Trojan horse opens a proxy on your system that allows it to relay e-mail. It can update or uninstall itself. Unlike its previous variants, Trojan.Mitglieder.H does not try to stop security software.

    W32.Gaobot.WO is a variant of W32.Gaobot.gen. It attempts to spread through network shares that have weak passwords. It also allows attackers to access an infected computer through a predetermined IRC channel. The worm uses multiple vulnerabilities to spread, including the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026), using TCP port 135; the RPC locator vulnerability (described in Microsoft Security Bulletin MS03-001), using TCP port 445; the WebDav vulnerability (described in Microsoft Security Bulletin MS03-007), using TCP port 80; and the workstation service buffer overrun vulnerability (described in Microsoft Security Bulletin MS03-049), using TCP port 445.

    W32.Tunk.A is a file-prepending virus. Infected systems may fail to restart from May 2004 onward.

    Backdoor.Nibu.D is a multi-threaded Trojan horse that opens a back door, runs a key logger, and attempts to steal personal information.

    PTF’S AND FIXES FOR OS/400 AND RELATED PROGRAMS

    IBM released the latest cumulative package for V5R2 customers on March 29.

    The latest HIPER package was released March 16.

    The Database Group PTF was updated February 26.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Watch this webinar where we showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch the replay now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Ricoh Printers Get Better iSeries Connectivity with WCO Power5 OS/400 Servers to Ship by End of June

    Leave a Reply Cancel reply

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle