==================================================================== 
SEARCH400.COM | Security Tip 
Nov. 12, 2002 
==================================================================== 
FROM OUR SPONSORS: 

Free iSeries Security Advice from Wayne O. Evans: Live Webinar Dec 10
http://search400.com/r/0,,7437,00.htm?pentasafe

=========================================================== 
Essential explanations and tools to help secure the iSeries. 
 More tips: 
http://search400.techtarget.com/tipsIndex/0,289482,sid3_tax2f8,00.html

=========================================================== 
In today's technical advice roundup you'll find tips, expert 
answers and input from your peers to the following iSeries 
security questions and concerns: 

Today's Featured Security Tip: 
  -- Keep iSeries security simple 

Answers to Other Technical Questions:
 - How to prevent a hack attack
 - Secure your iSeries
 - Is there such a thing as a bulletproof password?
 - Error message after OS/400 upgrade

Important Announcements and Links
 - Tips Contest: October winners announced
 - Free Book Excerpt: IBM eServer iSeries: Built for e-business
 - Expert Profile: Carol Woodbury, Search400.com security expert
 - Free on Search400.com: White Papers on iSeries security

________________________________________________________________
****************** SPONSORED BY PentaSafe **********************

Free iSeries Security Advice from Wayne O. Evans: Live Webinar Dec.
10. The iSeries is an inherently secure system, but with technology
like TCP/IP, ODBC, FTP, Client Access or the Internet your iSeries
security can be easily compromised, especially if you don't have the
proper configuration in place. Tune in to this webinar on Dec. 10,
hosted by PentaSafe and Wayne O. Evans "the Grandfather of iSeries
Security," to learn some iSeries security tips, how to pass audits
faster, and you can protect your company's critical information from
unauthorized access. Click here to register!
http://search400.com/r/0,,7437,00.htm?pentasafe

================================================================== 
Today's Featured Tip 
================================================================== 

Keep iSeries security simple

When you initially approach the subject of security on the 
iSeries, or any machine for that matter, sometimes the task can 
seem monumental.  You have to concern yourself with every object 
on the system and decide who can have access and what level of 
access they can have.  For most iSeries shops, the number of 
objects on your system is astronomical.  Having to make 
decisions on that grand a scale is enough to scare most IT 
professionals away from the task.  The sad part is, many do 
ignore security, simply because it appears to be so difficult.  
The result of that approach can be costly when security is 
compromised. 
 
The key to implementing an effective security design is to keep 
it as simple as possible.  The designers of OS/400 security had 
this in mind when they created the security layer on your 
system, so it is entirely possible to achieve. 

>> CLICK here for the full tip:
http://www.search400.com/tip/1,289483,sid3_gci862508,00.html
 
=========================================================== 
Answers to Other Security Questions 
===========================================================

How to prevent a hack attack
Although the OS/400 is a relatively closed operating system that
prevents the OS internals from being accessed by user written
programs, the iSeries is still a computer and unless it is properly
secured, there is a multitude of ways an unauthorized person can gain
access. This tip describes three ways and how to prevent them.
http://search400.techtarget.com/tip/1,289483,sid3_gci809408,00.html 

Secure your iSeries
The iSeries is one of the most secure systems, but there are 
still ways for data to be compromised -- network holes and users 
with too much authority, for example. The information in this 
Search400 Featured Topic helps you close up any gaps you may 
have.
http://search400.techtarget.com/featuredTopic/0,290042,sid3_gci783697,00.html

Is there such a thing as a bulletproof password?
One iSeries user wondered what the best way to create a 
bulletproof password would be. Search400.com security expert Dan 
Riehl explains that there are many considerations when dealing 
with password security and that no plan is ever bulletproof.
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid491947_tax288767,00.html

Error message after OS/400 upgrade
One user writes, "After installing the OS/400 upgrade from V4R5 
to V5R1 I'm getting the message: User quser not authorized to 
object qtemp/zrcrpcspc type *usrspv. This message is on our 
audit log. I'd like to know how to stop it." Search400.com 
security expert Carol Woodbury offers some advice.
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid493929_tax288767,00.html

_________________________________________________________________ 
::::::::  DON'T MISS THESE IMPORTANT MESSAGES AND LINKS :::::::::

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
OCTOBER WINNERS ANNOUNCED | Search400.com tips contest

You've been patient all month, and the results are finally in...
The top winner for Search400.com's Tips Contest for October is 
Robert Allen. Robert won a $50 Amazon.com gift certificate and 
was added to our Hall of Fame for his tip: "Password equal to 
profile revisited,"
http://www.search400.com/tip/1,289483,sid3_gci853244,00.html

Congratulations also to our runner-up winners: Jim Doyle, Naveen 
Dronavalli and Alex Nubla. View all winning tips in 
Search400.com's Hall of Fame:
http://search400.techtarget.com/tipsHallOfFame/0,289489,sid3_prz826588_cts826578,00.html

NEW CONTEST FOR NOVEMBER: This month we're giving away a 
Panasonic RR-US320 IC digital voice recorder. Stay at the top of 
your game with this Panasonic digital voice recorder. It 
features three recording modes and stores up to 100 minutes in 
long-play mode. The dual display shows the remaining memory and 
you can even link up to your PC with the provided USB terminal 
and cable for data editing. Send in your tip -- you could be our 
next winner.

>> SUBMIT a Tip:
http://search400.techtarget.com/tipsSubmit/0,289485,sid3,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
FREE BOOK EXCERPT | IBM eServer iSeries: Built for e-business

Search400.com would like to offer our members the opportunity to 
download for free the first chapter of IBM eServer iSeries: 
Built for e-business written by Bob Cancilla and published by 
IBM Press.

With this book, author Bob Cancilla provides a road map for 
iSeries customers to identify and understand the tremendous 
wealth of e-business software bundled with OS/400. He takes each 
of the main e-business components and explains what it is, how 
it works, and how it can be used to improve business 
environments. Bob focuses on the function available and provides 
a glimpse into the future by describing function currently under 
development. 

>> DOWNLOAD the chapter: 
http://search400.techtarget.com/whitepaperPage/0,293857,sid3_gci859248,00.html

>> BUY the book: 
http://www.digitalguru.com/DigitalGuru/product_detail.asp?catalog_name=Books&category_name=&product_id=1931182086&partner_id=55

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
EXPERT PROFILE | Carol Woodbury, Search400.com security expert 

Carol Woodbury is co-founder of SkyView Partners, a security
consulting practice focused on the iSeries platform. Carol, prior to
holding the position of vice president of Research and Development at
PowerTech, served as IBM's security architect for more than 10 years.
During her tenure with IBM, Carol led the AS/400 (iSeries) 
Security Development team and designed many aspects of OS/400's
security features.  In addition Carol consulted with numerous iSeries
business partners and customers.  

Carol speaks frequently on a variety of security topics at
conferences and user groups around the world and is a technical
editor for IBM's eServer, iSeries edition magazine.  Carol also
co-authored Implementing AS/400 Security a widely read book on
security.

Let Carol's experience work for you. Ask Carol Security-related 
questions anytime. 

>> CLICK HERE TO ASK Carol a question:
http://Search400.techtarget.com/ateQuestion/0,289624,sid3_cid423497_tax288767,00.html

>> CLICK HERE TO READ recent Q&As:
http://search400.techtarget.com/ateAnswers/0,289620,sid3_cid423497_tax288767,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
WHITE PAPERS ON ISERIES SECURITY |Free on Search400.com

When it comes to securing your iSeries, the more advice and help 
you have the better. Browse Search400's new white papers section 
to find informative white papers on security and several other 
iSeries topics.

>> CLICK here to view the white papers:
http://search400.techtarget.com/whitepapersByCategory/0,293837,sid3_tax292513_idx0_off10,00.html

__________________________________________________________________ 
::::::::::::::::::::::::  SEARCH400 CONTACTS   ::::::::::::::::::: 

 TIP MAILBOX, (mailto:tips@;search400.com) 
   >> Send us feedback on tips and ideas for new tip content. 
_________________________________________________________________ 
  
 MICHELLE DAVIDSON, Site Editor 
(mailto:mdavidson@;techtarget.com) 
   >> Send us your story ideas and best practices. 
_________________________________________________________________ 

 DEBRA TART, Assistant Editor (mailto:dtart@;techtarget.com) 
   >> Send us your tips and Best Web Links. 
_________________________________________________________________ 

 DAVID GABEL, Executive Tech Editor 
(mailto:dgabel@;techtarget.com) 
   >> Send me your technical tips and tip ideas. 
_________________________________________________________________

 GABRIELLE DERUSSY (mailto:gderussy@;techtarget.com) 
   >> Sponsor this or any other TechTarget newsletter. 
_________________________________________________________________

::::::::::::::::::::::  ABOUT THIS NEWSLETTER  :::::::::::::::::: 

Published by TechTarget (http://www.techtarget.com)
TechTarget - The Most Targeted IT Media
Copyright 2002 TechTarget. All rights reserved.









If you no longer wish to receive this newsletter simply reply to this
message with "REMOVE" in the subject line.  Or, visit
http://search400.techtarget.com/register and adjust your
subscriptions accordingly.If you choose to unsubscribe using our
automated processing, you must send the "REMOVE" request from the
email account to which this newsletter was delivered.  Please allow
24 hours for your "REMOVE" request to be processed.

Reply via email to