• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback and Insights: Suggestions for a Temporary Library

    May 29, 2002 Timothy Prickett Morgan

    Hey, Ted:

    In the April 24 issue of Midrange Guru, OS/400 Edition, you described a method of creating a temporary library that would provide the same function as QTEMP. I would like to make a couple of comments:

    ASC

    In addition to creating the temp library, it would be a good idea to add this library to the top of the library list. QTEMP is already there, and including the temp library would allow *LIBL to be used.

    To retain this temporary library, you suggested creating data area KEEPTEMP in a library in the job’s library list. I would

    …

    Read more
  • String Parameters of Various Lengths

    May 29, 2002 Timothy Prickett Morgan

    Hey, Ted:

    I have an RPG IV subprocedure that I call from several different programs. I use what I call the QCMDEXC method to pass a character string to it. That is, I pass two parameters–the character string and the length of the character string. I would like to eliminate the second parameter.

    ASC

    The subprocedure would have to determine the length of the character string that is passed to it. Is that possible?

    — Karen

    Yes, it’s possible. Your subprocedure needs the operational descriptor of the parameter. Here’s what you need to do.

    Add the OPDESC keyword to the parameter

    …

    Read more
  • Prevent Someone Else from Peeking at Your Window 2000/XP System

    May 29, 2002 Timothy Prickett Morgan

    Dear Readers:

    If you have a Windows 2000 or Windows XP machine connected to the Internet, chances are good that your computer’s security information, including user profiles, account policies, and share names are freely available to any hacker on the Internet.

    BCD Int'l

    This is because, by default, Windows 2000 and Windows XP do not restrict anonymous access to the above listed information.

    However, you can very easily prevent others from gaining access to this sensitive information on your PC by making one very simple change to the Windows Registry.

    Here’s how:

    1. Click on the Windows Start button.

    2. Click Run.

    3. Enter “Regedit”

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle