• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Bytware Announces i5virus Winners

    January 28, 2008 Dan Burger

    Case closed. For two months at the end of 2007, System i users from around the world were on the trail of cyber criminals who compromised the security of several financial organizations. Justice, you’ll be happy to learn, has been served. Fictionally speaking, that is. Bytware, a System i vendor specializing in system management and security solutions, used this well-developed and highly publicized cyber crime game as a marketing tool to bring attention to security issues surrounding the use of PHP on the System i and, of course, to associate the company with antivirus protection. It worked as easily as an open and shut case.

    Through an advertising campaign that leaked clues about how the crimes were committed and who might be responsible, Bytware was able to not only increase awareness of a potential problem, but also provide some entertainment along the way. Chris Jones, marketing director at Bytware, was the brains behind the caper and the viral marketing approach that it took. He made clever use of a YouTube video and an on-going scenario of clues that were picked up by savvy amateur sleuths who attempted to be the first to nab the perpetrators. It was sort of a blending of CSI: System i meets the Amazing Race.

    In short, the drama began when a financial services company had its System i server hacked by a crime syndicate in China. As the story unfolded, participants (the would-be cyber detectives) searched for clues via videos posted to a unique Website, YouTube videos, and advertisements that appeared on System i-related Websites.

    According to a press release from Bytware, “more than 1,600 players from 65 countries took part in the game.” The company also released the list of contest winners: Anna Musella-Chiasson, a senior analyst at CGI in Canada, was the grand prize winner. She collected a Nintendo Wii for her sleuthing efforts. Other top cyber crime detectives included Kristina Alcorn, a senior systems engineer at the Automotive Retail Group in Troy, Michigan; Suzanne Dahms, executive vice president of Union Bank in Lake Odessa, Michigan; John Pfitzner, a programmer at EFCO in Monett, Missouri; and Patrick Sczypiorski, a manager of application systems at Velvac in New Berlin, Wisconsin.

    For those wondering about the “hackability” of the System i, it is true that i5/OS is immune from Windows viruses. However, the Integrated File System that is an adjunct to i5/OS can serve as a repository for Windows viruses, and can therefore infect and re-infect Windows PCs, even those that have antivirus installed. The possibility of a PHP vulnerability leading to a virus that could infect i5/OS or the IFS is similar to Windows virus infestations on the System i server. PHP.org lists 480 vulnerabilities in the PHP runtime at this time. Yikes.

    RELATED STORIES

    ‘Viral’ Marketing Campaign from Bytware Targets PHP-i5/OS Security

    Bytware i5 Security Campaign Gaining World Recognition



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 17, Number 4 -- January 28, 2008

    Sponsored by
    Krengeltech

    When it comes to consuming web APIs on your IBM i, your options often boil down to one of two things:

    First, you end up having to rely on a variety of open source and non-RPG solutions. This adds developer complexity, taking away time that could have been better spent invested in other projects. Of course, open source software is free, but generally comes at the cost of no professional support, which adds an element of risk in your production environment. RXS is completely professionally supported, and is complemented by a staff of trained IBM i developers who can address your nuanced development challenges, head on.

    Second, if you choose not to pursue an open-source solution, you’re often left having to shake up your current program architecture with proprietary software, external dependencies, and partial RPG implementations – many of which are sub-par compared to RPG-XML Suite’s wide range of features. RXS aims to simplify the efforts of developers with tools like code generators, useful commands, and subprocedures written in 100% RPG – no Java. Because they are entirely RPG, the RXS subprocedures are easy to add to new or existing ILE programs and architecture, helping to cut your development time. RPG-XML Suite offers powerful capabilities in an accessible, easy-to-implement format.

    With RPG-XML Suite, you can accomplish a variety of complex tasks, such as:

    • Calling REST and SOAP web services from your IBM i
    • Offering APIs from your IBM i
    • Creating JSON & XML
    • Parsing JSON & XML
    • Text manipulation, Base64 encoding/decoding, CCSID handling, hashing and encryption functions, and more.

    To try RXS for yourself, we recommend a free proof of concept, which not only gives you access to all of RPG-XML Suite’s subprocedures and utilities but also includes a tailor-made software demonstration that can be used as a starting point for your future API implementations.

    For a free proof of concept, contact us at sales@krengeltech.com, or visit our website for more information.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Before You Buy That New System i, Part 2 i5/OS V6R1 Announced Today, Ships in March

    Leave a Reply Cancel reply

TFH Volume: 17 Issue: 4

This Issue Sponsored By

    Table of Contents

    • IBM to Buy AMD? Seems Unlikely, But an Interesting Idea
    • i5/OS V6R1: It Must Be Getting Close, Since People Are Talking
    • Microsoft Rains on IBM’s Lotusphere Parade
    • As I See It: Avatar Nation
    • Readers Pipe Up On the STG Reorg and System i Wish List
    • IBM Tweaks Prices on BladeCenter H and Power Blade Networking Gear
    • IBM Buys AptSoft, Bringing Yet Another Twist to the SOA Story
    • The Model 270: Of Course It Runs V5R4, But Now What?
    • System i Recruiter Nate Viall Does NBC Nightly News
    • Bytware Announces i5virus Winners

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • The Cloud’s Future Is So Bright, So Why Are You So Glum?
    • Most App Modernization Projects a Struggle, Survey Finds
    • COMMON Launches IBM i Security Conference
    • Four Hundred Monitor, August 17
    • A Slew Of Add-On Services For Power10 Systems
    • Power10 Midrange Machine: The Power E1050
    • IBM Puts The Finishing Touches On PowerHA For IBM i 7.5
    • Guru: Regular Expressions, Part 2
    • Get Your Security Education, And Not From The School Of Hard Knocks
    • IBM i PTF Guide, Volume 24, Number 33

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2022 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.