The Gordian knot that Alexander solved is also a great example of lateral thinking, where you can find solutions by applying a different perspective on the problem. Similarly, there is a possibility that by applying a different thought perspective, it is possible to hack data protected by the IBM i AS/400 iSeries.
Hackers will not try to obviously breach security directly, instead, they will resort to more misleading methods to trick you and gain access, much like the Trojan horse. By creating a CL program that mimics the user’s sign-on screen by overriding the QDSIGNON display file, the user is tricked into providing their credentials on this screen. The user will not find any difference between their regular sign-on screen and the screen that is mimicked by the program. The Trojan program also closes once the information is retrieved. Yet another method to steal user information on an IBM i AS/400 sig-on screen is through a display file comprising the User-defined Data Stream (USRDFN) keyword. Using a trace command, Trace ICF (TRC-ICF), it is again possible to get the user ID and password details.