× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Joe Pluta wrote:
I'm not sure I understand this, Buck. Are you talking about installing software into the IFS from an i5/OS terminal, or copying something to the IFS via mapped drive or FTP? If the former, yes, you have to keep all your safeguards in place. But I contend that the latter can't cause malware to execute on i5/OS.

Regular old native. Imagine you are a naughty programmer at a major ERP vendor and you plopped a back door in a program that adopts QSECOFR authority. The installation instructions say to sign on as QSECOFR to install the software. Voila, malware running in green screen, installed in green screen, stored in QSYS.LIB.

Yes, it's a hole, but when you do a security sweep and find several of your ERP (or cross reference tool) programs adopting QSECOFR authority, what can you do?

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.