• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback and Insights: Suggestions for a Temporary Library

    May 29, 2002 Timothy Prickett Morgan

    Hey, Ted:

    In the April 24 issue of Midrange Guru, OS/400 Edition, you described a method of creating a temporary library that would provide the same function as QTEMP. I would like to make a couple of comments:

    ASC

    In addition to creating the temp library, it would be a good idea to add this library to the top of the library list. QTEMP is already there, and including the temp library would allow *LIBL to be used.

    To retain this temporary library, you suggested creating data area KEEPTEMP in a library in the job’s library list. I would

    …

    Read more
  • String Parameters of Various Lengths

    May 29, 2002 Timothy Prickett Morgan

    Hey, Ted:

    I have an RPG IV subprocedure that I call from several different programs. I use what I call the QCMDEXC method to pass a character string to it. That is, I pass two parameters–the character string and the length of the character string. I would like to eliminate the second parameter.

    ASC

    The subprocedure would have to determine the length of the character string that is passed to it. Is that possible?

    — Karen

    Yes, it’s possible. Your subprocedure needs the operational descriptor of the parameter. Here’s what you need to do.

    Add the OPDESC keyword to the parameter

    …

    Read more
  • Prevent Someone Else from Peeking at Your Window 2000/XP System

    May 29, 2002 Timothy Prickett Morgan

    Dear Readers:

    If you have a Windows 2000 or Windows XP machine connected to the Internet, chances are good that your computer’s security information, including user profiles, account policies, and share names are freely available to any hacker on the Internet.

    BCD Int'l

    This is because, by default, Windows 2000 and Windows XP do not restrict anonymous access to the above listed information.

    However, you can very easily prevent others from gaining access to this sensitive information on your PC by making one very simple change to the Windows Registry.

    Here’s how:

    1. Click on the Windows Start button.

    2. Click Run.

    3. Enter “Regedit”

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • LANSA Developing Business Intelligence Tool
  • Blazing The Trail For VTL In The Cloud
  • Data De-Dupe Gives VTL Customers More Options
  • Four Hundred Monitor, March 29
  • The Big Spending On IT Security Is Only Going To Get Bigger
  • IBM Tweaks Some Power Systems Prices Down, Others Up
  • Disaster Recovery: From OS/400 V5R3 To IBM i 7.4 In 36 Hours
  • The Disconnect In Modernization Planning And Execution
  • Superior Support: One Of The Reasons You Pay The Power Systems Premium
  • IBM i PTF Guide, Volume 25, Number 13

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle