MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

September 10, 2010 | Volume 7 Issue 36


TOP STORY: TechTip: 7.1 Offers Encrypted Debug Views
FEATURED ARTICLE: Are Your Employees Traveling with (and Putting at Risk) Sensitive Company Information?
NEWS HIGHLIGHT: IBM Extends x86 Server Lineup with AMD Processors
FORUM: Printing PDFs from IFS
MC STORE: Top 10 Best-Selling Titles for August 2010
BLOG: System i Management Tips

Manage Subscription | Contact Us

Feature Article - TechTip
TechTip: 7.1 Offers Encrypted Debug Views

Thanks to the new DBGENCKEY parameter, you can now debug your customers' code while protecting your source.

gina_whitneyWritten by Gina Whitney

If you stop and think about what some of your most important assets to your company are, your source code would most likely be on that list. Protecting your code is essential. Unfortunately, there are times when one of your customers encounters a problem. The easiest way to figure out the problem would be to put a debuggable version of your code onto the system. But now, your code isn't protected anymore. So you either expose your code or figure out another way to diagnose the problem. Wouldn't it be nice to just ship a debuggable version of your code and have it secure? In 7.1, the ILE compilers (RPG, COBOL, CL, C, and C++) and precompilers have a new parameter that allows you to encrypt your debug views. This means that you can ship debuggable code and know that your code is not exposed.


Feature Article - Security
Are Your Employees Traveling with (and Putting at Risk) Sensitive Company Information?

The chances of travelers losing sensitive data riding on laptops, mobile devices, or USB drives are running high today for anyone who doesn't effectively encrypt their data.

chris_smithWritten by Chris Smith

Editor's Note: Chris Smith is on vacation this week, so we have revived one of his more popular columns pertaining to laptop and flash-drive security and data encryption that first appeared in June 2008 as "Hardware Encryption Offers Benefits over Software Encryption." The topic has as much relevance today as it did then.


We usually think of encrypting data as a way to protect it from hackers and criminals, but did you ever consider that the U.S. federal government can now search your laptop without probable cause?


Most Popular MC Press Books

Top 10 Best-Selling Titles for August 2010

  1. You Want To Do WHAT with PHP?
  2. The IBM i Programmer's Guide to PHP
  3. Advanced, Integrated RPG
  4. Functions in Free-Format RPG IV
  5. SQL for eServer i5 and iSeries
  6. The Remote System Explorer
  7. Free-Format RPG IV
  8. Programming in RPG IV, Fourth Edition
  9. HTML for the Business Developer
  10. The Modern RPG IV Language, Fourth Edition





In the News

Support MC Press - Visit Our Sponsors


Forums Sponsor





Search Sponsor





MC Industry Blog

BLOG: System i Management Tips from Vision Solutions, Inc.


Latest Posting: 3/26/10 Additional ways to see the contents of a user space (*USRSPC)


01/29/10 How to determine the jobs or objects responsible for generating journal entries in a journal receiver?

12/17/09 How to search for text in a file at the member level

11/20/09 Simplify replication of devices between two systems by matching hardware resource names

10/21/09 Know the impact of using the ENDJOBABN command

10/2/09 How to rapidly set up a network printer using IBM Personal Communications