• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback On Mad Dog 21/21: In Hack Signo Vinces

    July 18, 2011 Timothy Prickett Morgan

    The opening statement about IBM‘s site being hacked is semi-interesting but has nothing to do with the iSeries. The only people hosting Web sites on the iSeries are us, the iSeries customers, certainly not IBM.

    The info given is good–never can have enough info about security–but has nothing to do with the hack, or preventing the hack. The IBM i operating system and the PowerPC instruction set eliminate most hack gambits. DB2 usage eliminates another class of gambits based on SQL Server. What’s left is lame Web page programming that allows SQL injection or cross-site scripting, has nothing to do with the OS, and mostly is just passed through to visitors like a parasite.

    All in all, this article could have been used to tout the superior security and performance of the iSeries over especially Windows and also Linux on Intel, which are where systems are broke into and data stolen, money stolen, personal info stolen, government info stolen, where every failure of security on the internet takes place.

    But not on the System i. Secure serving on the System i. That should be the message.

    –Ralph

    RELATED STORY

    In Hack Signo Vinces



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    Want to deliver DevOps on IBM i?

    DevOps enables your IBM i development teams to shorten the software development lifecycle while delivering features, fixes, and frequent updates that are closely aligned with business objectives. Flexible configuration options within MDChange make it easy to adapt to new workflow strategies and policies as you adopt DevOps practices across your organization.

    Learn More.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    How Do I Email a PC5250 Screen Shot? INSERT to Overlay Positions in a Character String

    Leave a Reply Cancel reply

Volume 20, Number 25 -- July 18, 2011
THIS ISSUE SPONSORED BY:

looksoftware
PowerTech
inFORM Decisions
Computer Keyes
Twin Data Corporation

Table of Contents

  • Still Wanted: A Power-i System of Systems
  • Post-Recession IT Jobs and Spending Lackluster, Surveys Say
  • Hosted Services And Great Expectations
  • Mad Dog 21/21: Smart Fellers
  • Hands-On, Virtual Training for i Coders and Admins
  • Reader Feedback On Mad Dog 21/21: In Hack Signo Vinces
  • Sundry Summer Power Systems Announcements
  • CEOs and CFOs Pull Rank On CIOs In IT Purchasing Decisions
  • Microsoft Spends Big Big Bucks On Partner Channel
  • SAP Wants Oracle’s TomorrowNow Award Cut Way Down

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Positive News From The Kyndryl Mainframe Modernization Report
  • NAViGATE, inPower 2025 On Tap for September 2025
  • Guru: WCA4i And Granite – Because You’ve Got Bigger Things To Build
  • As I See It: Digital Coup
  • IBM i PTF Guide, Volume 27, Number 37
  • AI Is Coming for ERP. How Will IBM i Respond?
  • The Power And Storage Price Wiggling Continues – Again
  • LaserVault Adds Multi-Path Support To ViTL
  • As I See It: Spacing Out
  • IBM i PTF Guide, Volume 27, Numbers 34, 35, And 36

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle