MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

February 11, 2009 | Vol 4 Issue 3


In This Issue:

Feature Article - Security
Employing Best Practices for IBM i Security

In this article, security expert Carol Woodbury advises how to keep your IBM i secure.

carol_woodbury.gifBy Carol Woodbury

When I was asked to write this article, my thought was, haven't I written this article before? The answer is yes, but it's been awhile and times have changed, so there are new issues to be aware of when considering security best practices for i.


Feature Article - Security
Protect Your Intellectual Property Using Obfuscation

Obfuscation protects your source code from potential security threats while keeping the application's functionality in place.

joydip_kanjilal.pngBy Joydip Kanjilal

Obfuscation is a process that involves converting your source code and data into an equivalent code or format such that it becomes difficult to reverse-engineer it using the decompiler tools without changing any of the application's code or functionality. This article discusses what obfuscation is, what the benefits of obfuscation are, and how you can use obfuscating tools in .NET, Java, and even JavaScript to prevent your code from potential threats.


Advertorial - SkyView Partners, Inc.
Partner TechTip: Let's Review!

So you've made your system compliant. Now you're done, right? Wrong!

carol_woodbury.gifBy Carol Woodbury

Compliance is not a one-time event. Without regularly scheduled reviews, you can fall out of compliance. Let's discuss some of those reviews.

Security Policy

Many laws and regulations require that your security policy be reviewed at least annually....


Support MC Press - Visit Our Sponsors

Forums Sponsor

 Popular Forums




 Search Sponsor


 Popular Searches