MC Press Online

Thursday, May 25th

Last updateMon, 22 May 2017 4pm

You are here: Home PUBLICATIONS MC TNT Tips 'n Techniques February 17, 2017
Lead Article - Security

Insiders Are a Threat to IBM i? No Way! Yes Way!

Carol discusses how the current thoughts on insider threats needs to be redefined and how insider threats can leave IBM i vulnerable.

Written by Carol Woodbury

I read an interesting article that discussed a study done by the Ponemon Institute on the “Cost of Insider Threats.” It piqued my interest because most of the people I talk to in the IBM I world don’t believe there’s any threat by people from inside their organization. The two reasons I hear most are “I trust our employees” and “Our employees would have no clue how to get access to the system through something like ODBC. They can barely sign on to their green-screen menu.” I decided to read the actual study to determine if there was applicability to the IBM i world.

The Study defined three types of insider threats:

MC Press Bookstore

Barcode400 Labeling Software for the IBM i

All Data and Software Resides on the IBM i: Everything is centralized and secure.
Graphical Designer: Design labels in minutes.
Integrate and Print with Existing Apps: Call from RPG, COBOL, CLP and JAVA programs.
Compliance Labels Provided: Extensive library of predesigned label templates.
Supply Chain Solution: Easily integrated into any IBM i ERP or WMS solution.

Learn about new Features here, or watch a quick video on 4.0 features here. Download a 30-day trial here!

TL Ashford - Since 1983

MC Press Bookstore

Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!

MC Press Bookstore

This ain’t your mama’s RPG! Time to move on from OPM—with Evolve Your RPG Coding. This comprehensive new book gives you all the tools to move to a more modern, modular, and efficient ILE RPG. The book guides you through the transition at a comfortable pace, making every ILE concept totally accessible. You’ll start with simple, easy-to-understand examples and analogies to OPM, then advance to complete and complex ILE code. Finally, you’ll go beyond ILE with a detailed discussion of SQL, code organization, and structure. Order your copy today!

 

Feature Article - Programming

TechTip: C# for RPGers - Easily Removing Duplicates, Sorting, and Reversing Lists

This time around, I’ll show how to perform some operations over lists that typically require some heavy coding.

Written by Rafael Victória-Pereira

Start by opening Visual Studio and locating the IntroducingLists.sln project. I’ll be using it on this TechTip to explain some more interesting methods that can save you a lot of time. Last time around, I stopped after inserting the missing old name of the IBM i. Now let’s re-add a couple of names to see how duplicates can be easily removed with a single line of code.

MC Resource Centers

Data Breaches: Is IBM i Really at Risk?

IBM i is known for its security, but this OS could be more vulnerable than you think.
Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high.
Watch noted IBM i security expert Robin Tatam as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.

Download your video link today from the MC Webcast Center

Element Break

Plus Choose From The Outstanding Selection in our MC Webcast Center

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.