Videos in an Alternate World - VS Code Compile Issues with IBM i Source| Nick Litten [IBM i AS400 iSeries] Software Developer
Welcome back, fellow *cough* AS400 code wranglers and green-screen survivors! If your IBM i source files are starting to look like that one drawer in your desk where cables go to die, it’s time for a tidy-up. Today, we’re diving into how Visual Studio Code can turn your RPGLE and COBOL chaos into something resembling […]| Nick Litten [IBM i AS400 iSeries] Software Developer
From RPG to PHP: An IBMi Programmers Guide to Building Your First WordPress Plugin| Nick Litten [IBM i AS400 iSeries] Software Developer
Your IBM i Power System (not its not an AS400 and no its not an ISERIES don’t trigger me!) is a digital hoarder’s paradise, stuffed with decades of code. Now, an OS upgrade or a PTF (Program Temporary Fix, aka IBM’s version of a software Band-Aid) changes a command’s behavior. Suddenly, you need to recompile […]| Nick Litten [IBM i AS400 iSeries] Software Developer
Intro| Silent Signal Techblog
Refactoring RPGLE: Scott Klement’s Copybooks in Free Format RPG If you’ve ever stared at a wall of fixed-format RPG code and wondered how to bring it into the 21st century, you’re not alone. In this video, let’s walk through the process of upgrading Scott Klement’s RPGLE copybooks, transforming legacy column-based RPG into sleek, readable free-format […]| Nick Litten [IBM i AS400 iSeries] Software Developer
If you're curious about the nostalgic world of AS400 RPG programming, come with me and let's dive into the art of printing reports using OUTPUT Specifications| Nick Litten [IBM i AS400 iSeries] Software Developer
Picture this: you're sipping your morning cup of PG Tips Tea, contemplating a third hobnob biscuit dunker, ready to tackle another day of IBM i wizardry, when| Nick Litten [IBM i AS400 iSeries] Software Developer
We are still playing a “game of ketchup” after the Independence Day holiday in the United States. This week, we learn that IBM i Java Development Kit 11 64-bit VMs Fail with UnsatisfiedLinkError After IBM i Java Group PTF Apply. You can find out more about this issue at this link. The affected IBM i| IT Jungle
We are still assembling the information on the new Power11 processor and the Power Systems machines that use them and working on our analysis before they start shipping on July 25. We will do the most thorough job that we can under the circumstances, as always, but we concede that pricing information is very hard| IT Jungle
If you are like me, you are a fan of podcasts, and one of my favorites is IBM Transformers, hosted by Ann Funai. It’s a must-listen for anyone navigating digital transformation or leading change in enterprise IT. With a thoughtful blend of personal stories and practical insights, Transformers goes beyond buzzwords to explore how leaders| IT Jungle
In the vast and varied ecosystems of Earth, few interactions between species have captured the imagination of scientists and casual observers alike as much as the relationship between bottlenose dolphins and puffer fish. This curious dance, often involving the deliberate provocation of the puffer fish to trigger its natural defense mechanism, has led to many| IT Jungle
The new multi-factor authentication (MFA) capability that IBM has built into the IBM i operating system is a real gamechanger in terms of securing the system and preventing unauthorized access to applications and data. However, it lacks some key capabilities that some customers are looking for in an MFA solution, which third-party vendors are eager| IT Jungle
If you are an ASNA shops, there is an important security update that the company wants you to be aware of. This is an important security notification regarding a vulnerability discovered in two ASNA Windows Services: ASNA Assist and ASNA Registrar. ASNA says that it has resolved this vulnerability with updated versions of all supported| IT Jungle
Today is Power11 announcement day, and as sometimes happens during the debut of a new processor and a new platform to go along with it, we do not have all of the details necessary to tell you everything you need to know about the new Power11 processor and the four of the five Power Systems| IT Jungle
Izzi Software today announced the acquisition of CNX Corp., owner of the Valence suite of Web development tools for IBM i. The deal is the first IBM i-related acquisition for Izzi, which was founded last year with a mandate to buy smaller IBM i and mainframe vendors that typically don’t get M&A attention from bigger| IT Jungle
Faced with ever-growing security concerns, IBM i shops are “attacking” the problem and taking real steps to improve their security posture, Fortra says in its latest State of IBM i Security study. It is the second straight year that Fortra has noticed an improvement in IBM i shops’ approach to security. However, there are still| IT Jungle
Brace yourself because the IBM i platform has five security vulnerabilities that you have to analyze and cope with in this week’s issue of the IBM i PTF Guide. Let’s just jump right in and get to it. First, we have Security Bulletin: IBM WebSphere Application Server is affected by arbitrary code execution (CVE-2025-36038), about| IT Jungle
In a meeting earlier today and a semi-techie project manager was asking about IBM i job run priorities. He had some firm ideas that every job should run lower| Nick Litten [IBM i AS400 iSeries] Software Developer
At the COMMON POWERUp 2025 conference this week, IBM pulled the covers back a bit on Watson Code Assistant for IBM i, the new name for the AI-powered coding assistant that IBM first started talking about one year ago. A public preview of WCA for i is becoming available to a limited number of testers,| IT Jungle
Brace yourselves, everyone. There are seven security vulnerabilities that you have to pay attention to this week for the IBM i platform. Remember, as security guru Carol Woodbury is fond of saying: the IBM i platform is not the most secure platform in the world, but the most securable platform in the world. You must| IT Jungle
Today, I’m diving into the fun world of legacy code modernization from the old AS400 style RPG to the new free-format IBM i Style RPG.| Nick Litten [IBM i AS400 iSeries] Software Developer
Welcome to May, and we start out with PH65941, a notice from Big Blue that IBM WebSphere Application Server is vulnerable to server-side request forgery (CVE-2025-27907 CVSS 4.1). You can check out this link for more details. IBM says that the fix for this APAR is set to be included with WebSphere Application Server 8.5.5.28| IT Jungle
Just a reminder that as part of the April 8 announcements, IBM Software Support content is changing to require entitlement check for software patches. See more at this link, but the gist of it is that IBM Software Support Troubleshooting, Question & Answer, and How To documents are changing to require entitlement. This means that| IT Jungle
It may be hard to believe, but with the launch of IBM i 7.6 today, it has been 13,440 days since OS/400 V1R1 was announced on June 21, 1988, and Big Blue has delivered 27 distinct releases of the OS/400 and IBM i platform with dozens of Technology Refresh interim updates between releases in the| IT Jungle
Big Blue today announced IBM i 7.6, the first new release of the operating system in three years. While version 7.6 brings a range of enhancements, arguably the biggest new feature is the addition of multi-factor authentication directly into the operating system, which will make adopting MFA simple and represent a “massive security improvement” at| IT Jungle
Good day, good people of IBM i Land. This week we start out with two security vulnerabilities and a known issue to beware of the BLOB! Let’s start with the security vulnerabilities. First we have Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a denial of service due to Netty (CVE-2025-25193), which you| IT Jungle
As part of our ongoing research of the IBM i platform we monitor news and updates related to the platform. Two weeks ago IBM published a support article about a compatibility issue affecting IBM i Access Client Solutions (ACS) when running on Windows 11 24H2. The “no man’s land” between system boundaries is always a playground for hackers, and this article was fascinating because it pointed to the Local Security Authority subsystem of Windows:| Silent Signal Techblog
Preface| Silent Signal Techblog
Preface| Silent Signal Techblog
Post-exploitation is a crucial element of any attack aiming for realistic objectives, so it is no surprise that the topic is extensively researched, resulting in a trove of information that defenders can rely on to design and implement countermeasures. Unfortunately, owners of IBM i systems do not have the luxury of access to such information right now. This was one of the main ideas we discussed with Ben Williams of Chilli IT, who was kind enough to introduce us to IBM’s Brunch and Learn w...| Silent Signal Techblog
In our first blog post of 2023, we continue our series about penetration testing IBM i. This time we look into how the so-called Adopted Authority mechanism can be abused for privilege escalation if privileged scripts are not implemented with enough care.| Silent Signal Techblog
Our next journey takes us into the infrastructure of a bank. One element of the infrastructure was an IBM i (AS/400) server, and the only piece of information we got to conduct the penetration test was its IP address. We had been collecting a list of common application and service users during previous pentests, so we could check their existence on this host using 5250 and POP3 protocols. By the way, the server exposed 63 remote services – are all of them really necessary? Our first step ma...| Silent Signal Techblog
When you get the chance to take a look at the IT systems of financial institutions, telcos, and other big companies, where availability has been a key business concern for decades, you’ll find, that some critical operations run through some obscure systems, in many cases accessed via nostalgic green-on-black terminals, the intricacies of which only a few people inside the company truly know. These systems might be IBM i’s – or as many senior folks know, “AS/400” or “iSeries” –...| Silent Signal Techblog