MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

September 10, 2010 | Volume 7 Issue 36


TOP STORY: TechTip: 7.1 Offers Encrypted Debug Views
FEATURED ARTICLE: Are Your Employees Traveling with (and Putting at Risk) Sensitive Company Information?
NEWS HIGHLIGHT: IBM Extends x86 Server Lineup with AMD Processors
FORUM: Printing PDFs from IFS
MC STORE: Top 10 Best-Selling Titles for August 2010
BLOG: System i Management Tips

Manage Subscription | Contact Us

Feature Article - TechTip
TechTip: 7.1 Offers Encrypted Debug Views

Thanks to the new DBGENCKEY parameter, you can now debug your customers' code while protecting your source.

gina_whitneyWritten by Gina Whitney

If you stop and think about what some of your most important assets to your company are, your source code would most likely be on that list. Protecting your code is essential. Unfortunately, there are times when one of your customers encounters a problem. The easiest way to figure out the problem would be to put a debuggable version of your code onto the system. But now, your code isn't protected anymore. So you either expose your code or figure out another way to diagnose the problem. Wouldn't it be nice to just ship a debuggable version of your code and have it secure? In 7.1, the ILE compilers (RPG, COBOL, CL, C, and C++) and precompilers have a new parameter that allows you to encrypt your debug views. This means that you can ship debuggable code and know that your code is not exposed.


Feature Article - Security
Are Your Employees Traveling with (and Putting at Risk) Sensitive Company Information?

The chances of travelers losing sensitive data riding on laptops, mobile devices, or USB drives are running high today for anyone who doesn't effectively encrypt their data.

chris_smithWritten by Chris Smith

Editor's Note: Chris Smith is on vacation this week, so we have revived one of his more popular columns pertaining to laptop and flash-drive security and data encryption that first appeared in June 2008 as "Hardware Encryption Offers Benefits over Software Encryption." The topic has as much relevance today as it did then.


We usually think of encrypting data as a way to protect it from hackers and criminals, but did you ever consider that the U.S. federal government can now search your laptop without probable cause?


In the News

Support MC Press - Visit Our Sponsors


Forums Sponsor





Search Sponsor