|
I printed the qhst file then saved it to a file called usrloginpf with on
field called usrloginpf I am trying run a sql using strsql to print a list
of the records containing a specific word and having difficulty
Or how can I check and select in using query function on iSeries
Sent from my iPhone
Thanks
D Jefferson
On Sep 18, 2024, at 12:24 PM, stefan@xxxxxxxxxx wrote:of electrons were terribly upset.
Go Cleanup
Option 1.
Best regards
Stefan
--
No trees were killed in the sending of this message, but a large number
David Jefferson via MIDRANGE-L
Stefan Tageson
+46 732 369934
stefan@xxxxxxxxxx
-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of
Sent: Wednesday, September 18, 2024 5:27 PMkept and what clears the logs from there Sent from my iPhone Thanks
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx
Cc: David Jefferson <djeffer32@xxxxxxxxx>
Subject: QHIST LOG FILE
Where is the setting on iSeries that determines how long QHIST logs are
robertowenberendt@xxxxxxxxx>:
D Jefferson
On Sep 17, 2024, at 6:41 AM, Patrik Schindler <poc@xxxxxxxxxx> wrote:
Hello Rob,
Am 16.09.2024 um 20:23 schrieb Rob Berendt <
concept of using a library list. Their fear is that someone could put a
I read the overview and it seems to have a real problem with the
version of the program higher in a library list which, while it has the
same name, does something completely different.
where the current directory is automatically first to be searched for
This is an almost 1:1 transfer of an attack vector on UNIX systems,
launchable objects (binaries, scripts with the x flag set).
for that purpose. Place a rogue "ls" there, wait until someone does a cd
Usually, the global /tmp directory, writable by anyone, has been abused
/tmp and ls. It's not applicable 1:1 to IBM i because there is no global
QTEMP, but it's job specific.
MYPGM you use CALL MYLIB/MYPGM. This would play havoc with rolling out
Their cure is to hardcode all program calls. So, instead of CALL
changes and test libraries.
research shows weak spots and the responsible sysadmin tries to implement a
Security often contradicts the necessities of daily work. Security
good middle ground between security and pragmatic approach so people can
actually do their jobs.
all of the storage and servers, disconnect them from power and network and
To show case an extreme measure: If you want to be 100% secure, take
put them into a large safe. No work can be done, though.
what's to stop me from sticking it into the original library?
Well, if I can stick this in a library higher in the library list,
settings which prevent a simple replacement.
That the original library or the original object has authorization
related questions.
:wq! PoC
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list To post a message email: MIDRANGE-L@xxxxxxxxxxxxxxxxxx To
subscribe, unsubscribe, or change list options,
visit: https://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxxxxxxxx
Before posting, please take a moment to review the archives at
https://archive.midrange.com/midrange-l.
Please contact support@xxxxxxxxxxxxxxxxxxxx for any subscription
list To post a message email: MIDRANGE-L@xxxxxxxxxxxxxxxxxx To subscribe,
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
unsubscribe, or change list options,
visit: https://lists.midrange.com/mailman/listinfo/midrange-lhttps://archive.midrange.com/midrange-l.
or email: MIDRANGE-L-request@xxxxxxxxxxxxxxxxxx
Before posting, please take a moment to review the archives at
related questions.
Please contact support@xxxxxxxxxxxxxxxxxxxx for any subscription
list
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
To post a message email: MIDRANGE-L@xxxxxxxxxxxxxxxxxxrelated questions.
To subscribe, unsubscribe, or change list options,
visit: https://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxxxxxxxx
Before posting, please take a moment to review the archives
at https://archive.midrange.com/midrange-l.
Please contact support@xxxxxxxxxxxxxxxxxxxx for any subscription
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: https://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxxxxxxxx
Before posting, please take a moment to review the archives
at https://archive.midrange.com/midrange-l.
Please contact support@xxxxxxxxxxxxxxxxxxxx for any subscription related
questions.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.