Security considerations for your library lists -- Part 1

The library list on your i5-iSeries-AS/400 controls how OS/400 searches for objects when no specific library has been coded. Changes to the library list could easily be used to execute a rogue program or cause your processing to run against an incorrect set of data. Rich Loeber says controlling how your library lists are set up on your system can mean the difference between secure and insecure processing.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchEnterpriseLinux

SearchDataCenter

Close