• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • The Top 10 IBM i Security Exposures, Part 1

    December 1, 2010 Wayne O. Evans

    In today’s highly security-conscious network environment, it’s important that you be aware of some of the common security exposures that could lead to a security breach of your systems. Even though there are excellent security features built into IBM i, today’s network environments often open your systems to exposures not even dreamed of a few years ago.

    Based on numerous security reviews I have conducted across different industries, the same types of security exposures appear over and over again. In this series of articles, I describe the top 10 most common security exposures and provide suggestions for minimizing your risk.

    …

    Read more
  • Case-Sensitive SQL Identifiers

    December 1, 2010 Hey, Ted

    Like most people who use SQL, I have never bothered worrying about which case a field name is written in. Case never seemed to matter. However, while performing a data fix, I discovered an instance where it does. (Fortunately, I was using test data!)

    I had a number of files from which records were to be deleted. The key values of the records to be deleted were held in a spreadsheet. There were three fields, one of them called VERSION, in the files I was deleting from.

    I tried to create a table to store the contents of the spreadsheet,

    …

    Read more
  • Admin Alert: Prototype Instructions for Running TCP/IP in i5/OS Restricted State

    December 1, 2010 Joe Hertvik

    A reader recently wrote asking how to configure i5/OS to use TCP/IP communications while in restricted state. Here are my prototype instructions for accomplishing this task. Due to constant uptime demands on my machines, however, I haven’t yet been able to fully test this process. But I invite any interested readers to test these instructions and write in with suggested changes. I’ll publish the best comments in a future article.

    Getting Started with Restricted State TCP/IP

    If you’re running recent versions of i5/OS or the i operating system, you should be able to run a subset of TCP/IP functions in

    …

    Read more
  • Large Subprocedure Return Values: V7 Brings Relief

    November 17, 2010 Jon Paris

    In Subprocedure Return Values–Food for Thought, I discussed the performance implications of returning large variables from subprocedures. With IBM i 7.1, IBM has added new RPG compiler features that improve performance when passing large parameters.

    The conclusion of my previous tip was that you should use a conventional parameter–instead of returning a value–when large values such as result sets were involved. The downside of such a change of course is that you lose the ability to know exactly which field was changed by a procedure call. Seeing:

    	GetCustomers( state: customerList ); 
    

    in the code just doesn’t make what is

    …

    Read more
  • Find Hidden IFS Files

    November 17, 2010 Ted Holt

    Everybody knows that the Work with Links (WRKLNK) command lists all the files (including subdirectory entries) in an IFS directory, right? Well, to quote Ira Gershwin, it ain’t necessarily so. Your system may have IFS files that you don’t know about.

    One of the UNIX conventions that the IFS has inherited is that files whose names begin with a period (“dot”) are considered to be hidden. By default, their names are omitted in directory listings. Hidden files are commonly used for system files, configuration files, and temporary files. But there’s nothing to stop other people from beginning file names with

    …

    Read more
  • Why Did Passphrase Activation Take Out My ODBC Connection?

    November 17, 2010 Hey, Joe

    We just activated passphrase support on our i5/OS V5R4M5 system. After activation, one of my Web server ODBC connections stopped working and I have no clue how to reset it. How can I get it working again?

    –Keith

    After getting this email, I contacted Keith and ran through a few scenarios. Here’s how we solved this issue as well as another issue that was hiding right behind it.

    First, we found that Keith was using an embedded password for his ODBC connection, which resided on a Web server that was automatically updating i5/OS data. The password was set to “LETMEIN”

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23
  • SEU’s Fate, An IBM i V8, And The Odds Of A Power13
  • Tandberg Bankruptcy Leaves A Hole In IBM Power Storage
  • RPG Code Generation And The Agentic Future Of IBM i
  • A Bunch Of IBM i-Power Systems Things To Be Aware Of
  • IBM i PTF Guide, Volume 27, Numbers 21 And 22

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle