Refactoring RPGLE: Scott Klement’s Copybooks in Free Format RPG If you’ve ever stared at a wall of fixed-format RPG code and wondered how to bring it into the 21st century, you’re not alone. In this video, let’s walk through the process of upgrading Scott Klement’s RPGLE copybooks, transforming legacy column-based RPG into sleek, readable free-format […]| Nick Litten [IBM i AS400 iSeries] Software Developer
If you're curious about the nostalgic world of AS400 RPG programming, come with me and let's dive into the art of printing reports using OUTPUT Specifications| Nick Litten [IBM i AS400 iSeries] Software Developer
Today, I’m diving into the fun world of legacy code modernization from the old AS400 style RPG to the new free-format IBM i Style RPG.| Nick Litten [IBM i AS400 iSeries] Software Developer
What is the action figure trend? The action figure trend, also known as the “Barbie Box Challenge” or “ChatGPT Action Figure Trend,” is a viral social media phenomenon that emerged in early 2025. It involves users creating AI-generated images of themselves as collectible action figures or dolls, complete with personalized packaging and accessories that reflect […]| Nick Litten [IBM i AS400 iSeries] Software Developer
Users can utilize the system request function to pause the job access the System Request Menu. This menu enables users to send and view messages, switch to a secondary, terminate the current job. However, this poses a potential security risk since the default public authority for the Request Menu is set to *USE when the […]| Nick Litten [IBM i AS400 iSeries] Software Developer
Who would win in a fight between AS400 Client Access and IBM i ACS? In a hypothetical showdown between IBM Client Access (the legacy AS400 version) and IBM i Access Client Solutions (ACS), it’s less a fight and more a generational beatdown – ACS would come out on top, hands down. IMHO of course. Think […]| Nick Litten [IBM i AS400 iSeries] Software Developer
Preface| Silent Signal Techblog
Preface| Silent Signal Techblog
Post-exploitation is a crucial element of any attack aiming for realistic objectives, so it is no surprise that the topic is extensively researched, resulting in a trove of information that defenders can rely on to design and implement countermeasures. Unfortunately, owners of IBM i systems do not have the luxury of access to such information right now. This was one of the main ideas we discussed with Ben Williams of Chilli IT, who was kind enough to introduce us to IBM’s Brunch and Learn w...| Silent Signal Techblog
In our first blog post of 2023, we continue our series about penetration testing IBM i. This time we look into how the so-called Adopted Authority mechanism can be abused for privilege escalation if privileged scripts are not implemented with enough care.| Silent Signal Techblog
When you get the chance to take a look at the IT systems of financial institutions, telcos, and other big companies, where availability has been a key business concern for decades, you’ll find, that some critical operations run through some obscure systems, in many cases accessed via nostalgic green-on-black terminals, the intricacies of which only a few people inside the company truly know. These systems might be IBM i’s – or as many senior folks know, “AS/400” or “iSeries” –...| Silent Signal Techblog