×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
I have already implemented a exit program to chk users are coming from authorized IPs or not but I want dual control. That's why I'm using this method.
Regards,
Chamara Withanachchi
IBM Certified Power System Expert
RPG Programmer
(owner of www.rpgiv.info)
WWW.RPGIV.INFO
Mob: +971 50 5698644
Tel: +971 6 5595887
chamaraw@xxxxxxxxxx
www.rpgiv.info
i want to be future ready. i want control. i want an i.
Sent from my BlackBerry® wireless device
-----Original Message-----
From: rob@xxxxxxxxx
Date: Mon, 15 Jun 2009 12:20:51
To: RPG programming on the IBM i / System i<rpg400-l@xxxxxxxxxxxx>
Subject: Re: Access pc file from RPG program
Sticking an ini on the clients machine to control what they can do on your
machine doesn't sound very secure. I think I'd look at exit point
programming and stuff.
Check out the sample exit point programs for ftp available at
http://www.redbooks.ibm.com/redbooks/pdfs/sg244815.pdf
http://publib.boulder.ibm.com/infocenter/iseries/v6r1m0/topic/rzaiq/rzaiqreferenceexit.htm
Rob Berendt
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.