MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

November 21, 2014 | Volume 11 Issue 46


TOP STORY: Protecting Your Passwords on IBM i
FEATURED ARTICLE: Book Review: Subfiles in Free-Format RPG
NEWS HIGHLIGHT: DR FlashCopy Solution Announced by Focal Point Solutions Group LLC
TRIAL SOFTWARE: Try the Most Powerful Anti-Virus Protection for IBM i for Free!
MC VIDEO PORTAL: Top 10 Security and Compliance Considerations for Cloud Computing


Sponsor - The MC Press Bookstore

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


Feature Article - Security
Protecting Your Passwords on IBM i

Many recent hacks have accessed networks and then accessed databases by obtaining administrator credentials (user IDs and passwords). Databases of emails and passwords are also being stolen from breached organizations. Carol discusses how to reduce password abuse.

carol woodburyWritten by Carol Woodbury

You may not realize it, but many of the organizations recently breached are large IBM i shops. The general public never knows whether our beloved IBM i was breached because that information is never published. But to dismiss the possibility out of hand and ignore steps that you can take to protect your organization and—more importantly—the data on your IBM i systems is putting that data at significant risk. This article focuses on protecting passwords since exploiting stolen credentials (user IDs and passwords) is one method being used by hackers to gain access to data.


Sponsor - The MC Press Bookstore

Cool stuff! Check out Subfiles in Free-Format RPG: Rules, Examples, Techniques & Other Cool Stuff. Here’s your chance to learn subfile concepts and programming techniques using free-format RPG. From basic subfile usage to advanced programming, this book offers concepts, explanations and practical examples that reflect current trends. Learn everything from single-page displays to embedded SQL. Includes downloadable templates that include the DDS and RPG code! On sale now for a great low price!


Feature Article - Programming
Book Review: Subfiles in Free-Format RPG

Whether you're a newbie or a seasoned pro, this book has something for you.

mike_faustWritten by Mike Faust

For System i developers, mastering the ability to develop subfile applications is an absolute must! In Subfiles in Free-Format RPG, Kevin Vandever takes the reader through the subfile concept—from start to finish. Unlike other books on the topic, this one specifically focuses on coding subfile applications in free-format RPG and does an excellent job of explaining how to use subfiles in the modern rendition of the RPG language.


Sponsor - The MC Press Bookstore

In this new release of Data Governance Tools, subject matter expert Sunil Soares walks you through all of the available software tools and shows you how to evaluate them for your program. Soares explains why your organization should consider tools to be a critical component of your data governance program, clarifies how these tools integrate with big data technologies, and shows you how the various software vendors stack up. Order this latest release today!


MC Software Center

Try the Most Powerful Anti-Virus Protection for IBM i for Free!

Think you don’t need virus protection on IBM i? Here’s why you do:

- The IFS is vulnerable and most modern applications and protocols use it.

- Viruses can hide inside Java and UNIX files, and IBM i can execute them.

- Anything an administrator can do, a virus can do.

And it’s not just viruses in the traditional sense. Many types of malicious code can compromise your security. And as the news shows, these breaches happen all the time. Fortunately, it’s easy to protect your IBM Power Systems with StandGuard Anti-Virus. Key feature include:


  • McAfee Scanning Engine
  • Native applications for IBM i, AIX, and Linux
  • Protection for Lotus Domino
  • Object Integrity Scanning

Try it FREE for 30 days!

The following trial software can also be found at the MC Press Software Center.


ACO MONITOR manages your IBM i 24-hours a day and notifies you immediately when your IBM i needs assistance!  

Auditing Tool with Built-in Reports for SOX, PCI Compliance 

Backup and Recovery on IBM i: Your Strategy for the Unexpected 

Control and Monitor User Access from Desktop PCs (ODBC, FTP)

Easiest Way to Save Money? Stop Printing IBM i Reports 

Electronic Forms: Free Trial Software – No Obligation

Free Trial of INPRO's TimeZoNe/400 (TimeZoNe Simulation Utility)

Free Trial of Linoma's Field and Backup Encryption Software Crypto Complete

Free Trial of Linoma's Managed File Transfer Software GoAnywhere

Hassle-Free IBM i Operations around the Clock 

Manage IBM i Messages by Exception with Robot

Query, Reporting & Analytics for IBM i: Free Trial 

Real-Time Message Monitoring and Notification for IBM i

Real-Time Performance Monitoring and Reporting for IBM i

Report Distribution: Free Trial Software – No Obligation

Try the Most Powerful Anti-Virus Protection for IBM i for Free! 

Try the one package that solves all your docu

In the News

Vendors:  Have a press release to share?  send it to MC Press

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Top 10 Security and Compliance Considerations for Cloud Computing


Whether you are using a cloud-based application or moving your whole infrastructure to the cloud, you should consider how this move effects your organization's security and compliance requirements. In this Coffee with Carol session, Carol Woodbury will discuss the top 10 considerations you should make as well as how to ensure that your organization's security and compliance requirements are not compromised.