==================================================================== SEARCH400.COM | Security Tip Nov. 12, 2002 ==================================================================== FROM OUR SPONSORS:
Free iSeries Security Advice from Wayne O. Evans: Live Webinar Dec 10 http://search400.com/r/0,,7437,00.htm?pentasafe =========================================================== Essential explanations and tools to help secure the iSeries. More tips: http://search400.techtarget.com/tipsIndex/0,289482,sid3_tax2f8,00.html =========================================================== In today's technical advice roundup you'll find tips, expert answers and input from your peers to the following iSeries security questions and concerns: Today's Featured Security Tip: -- Keep iSeries security simple Answers to Other Technical Questions: - How to prevent a hack attack - Secure your iSeries - Is there such a thing as a bulletproof password? - Error message after OS/400 upgrade Important Announcements and Links - Tips Contest: October winners announced - Free Book Excerpt: IBM eServer iSeries: Built for e-business - Expert Profile: Carol Woodbury, Search400.com security expert - Free on Search400.com: White Papers on iSeries security ________________________________________________________________ ****************** SPONSORED BY PentaSafe ********************** Free iSeries Security Advice from Wayne O. Evans: Live Webinar Dec. 10. The iSeries is an inherently secure system, but with technology like TCP/IP, ODBC, FTP, Client Access or the Internet your iSeries security can be easily compromised, especially if you don't have the proper configuration in place. Tune in to this webinar on Dec. 10, hosted by PentaSafe and Wayne O. Evans "the Grandfather of iSeries Security," to learn some iSeries security tips, how to pass audits faster, and you can protect your company's critical information from unauthorized access. Click here to register! http://search400.com/r/0,,7437,00.htm?pentasafe ================================================================== Today's Featured Tip ================================================================== Keep iSeries security simple When you initially approach the subject of security on the iSeries, or any machine for that matter, sometimes the task can seem monumental. You have to concern yourself with every object on the system and decide who can have access and what level of access they can have. For most iSeries shops, the number of objects on your system is astronomical. Having to make decisions on that grand a scale is enough to scare most IT professionals away from the task. The sad part is, many do ignore security, simply because it appears to be so difficult. The result of that approach can be costly when security is compromised. The key to implementing an effective security design is to keep it as simple as possible. The designers of OS/400 security had this in mind when they created the security layer on your system, so it is entirely possible to achieve. >> CLICK here for the full tip: http://www.search400.com/tip/1,289483,sid3_gci862508,00.html =========================================================== Answers to Other Security Questions =========================================================== How to prevent a hack attack Although the OS/400 is a relatively closed operating system that prevents the OS internals from being accessed by user written programs, the iSeries is still a computer and unless it is properly secured, there is a multitude of ways an unauthorized person can gain access. This tip describes three ways and how to prevent them. http://search400.techtarget.com/tip/1,289483,sid3_gci809408,00.html Secure your iSeries The iSeries is one of the most secure systems, but there are still ways for data to be compromised -- network holes and users with too much authority, for example. The information in this Search400 Featured Topic helps you close up any gaps you may have. http://search400.techtarget.com/featuredTopic/0,290042,sid3_gci783697,00.html Is there such a thing as a bulletproof password? One iSeries user wondered what the best way to create a bulletproof password would be. Search400.com security expert Dan Riehl explains that there are many considerations when dealing with password security and that no plan is ever bulletproof. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid491947_tax288767,00.html Error message after OS/400 upgrade One user writes, "After installing the OS/400 upgrade from V4R5 to V5R1 I'm getting the message: User quser not authorized to object qtemp/zrcrpcspc type *usrspv. This message is on our audit log. I'd like to know how to stop it." Search400.com security expert Carol Woodbury offers some advice. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid493929_tax288767,00.html _________________________________________________________________ :::::::: DON'T MISS THESE IMPORTANT MESSAGES AND LINKS ::::::::: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= OCTOBER WINNERS ANNOUNCED | Search400.com tips contest You've been patient all month, and the results are finally in... The top winner for Search400.com's Tips Contest for October is Robert Allen. Robert won a $50 Amazon.com gift certificate and was added to our Hall of Fame for his tip: "Password equal to profile revisited," http://www.search400.com/tip/1,289483,sid3_gci853244,00.html Congratulations also to our runner-up winners: Jim Doyle, Naveen Dronavalli and Alex Nubla. View all winning tips in Search400.com's Hall of Fame: http://search400.techtarget.com/tipsHallOfFame/0,289489,sid3_prz826588_cts826578,00.html NEW CONTEST FOR NOVEMBER: This month we're giving away a Panasonic RR-US320 IC digital voice recorder. Stay at the top of your game with this Panasonic digital voice recorder. It features three recording modes and stores up to 100 minutes in long-play mode. The dual display shows the remaining memory and you can even link up to your PC with the provided USB terminal and cable for data editing. Send in your tip -- you could be our next winner. >> SUBMIT a Tip: http://search400.techtarget.com/tipsSubmit/0,289485,sid3,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- FREE BOOK EXCERPT | IBM eServer iSeries: Built for e-business Search400.com would like to offer our members the opportunity to download for free the first chapter of IBM eServer iSeries: Built for e-business written by Bob Cancilla and published by IBM Press. With this book, author Bob Cancilla provides a road map for iSeries customers to identify and understand the tremendous wealth of e-business software bundled with OS/400. He takes each of the main e-business components and explains what it is, how it works, and how it can be used to improve business environments. Bob focuses on the function available and provides a glimpse into the future by describing function currently under development. >> DOWNLOAD the chapter: http://search400.techtarget.com/whitepaperPage/0,293857,sid3_gci859248,00.html >> BUY the book: http://www.digitalguru.com/DigitalGuru/product_detail.asp?catalog_name=Books&category_name=&product_id=1931182086&partner_id=55 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- EXPERT PROFILE | Carol Woodbury, Search400.com security expert Carol Woodbury is co-founder of SkyView Partners, a security consulting practice focused on the iSeries platform. Carol, prior to holding the position of vice president of Research and Development at PowerTech, served as IBM's security architect for more than 10 years. During her tenure with IBM, Carol led the AS/400 (iSeries) Security Development team and designed many aspects of OS/400's security features. In addition Carol consulted with numerous iSeries business partners and customers. Carol speaks frequently on a variety of security topics at conferences and user groups around the world and is a technical editor for IBM's eServer, iSeries edition magazine. Carol also co-authored Implementing AS/400 Security a widely read book on security. Let Carol's experience work for you. Ask Carol Security-related questions anytime. >> CLICK HERE TO ASK Carol a question: http://Search400.techtarget.com/ateQuestion/0,289624,sid3_cid423497_tax288767,00.html >> CLICK HERE TO READ recent Q&As: http://search400.techtarget.com/ateAnswers/0,289620,sid3_cid423497_tax288767,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- WHITE PAPERS ON ISERIES SECURITY |Free on Search400.com When it comes to securing your iSeries, the more advice and help you have the better. Browse Search400's new white papers section to find informative white papers on security and several other iSeries topics. >> CLICK here to view the white papers: http://search400.techtarget.com/whitepapersByCategory/0,293837,sid3_tax292513_idx0_off10,00.html __________________________________________________________________ :::::::::::::::::::::::: SEARCH400 CONTACTS ::::::::::::::::::: TIP MAILBOX, (mailto:tips@;search400.com) >> Send us feedback on tips and ideas for new tip content. _________________________________________________________________ MICHELLE DAVIDSON, Site Editor (mailto:mdavidson@;techtarget.com) >> Send us your story ideas and best practices. _________________________________________________________________ DEBRA TART, Assistant Editor (mailto:dtart@;techtarget.com) >> Send us your tips and Best Web Links. _________________________________________________________________ DAVID GABEL, Executive Tech Editor (mailto:dgabel@;techtarget.com) >> Send me your technical tips and tip ideas. _________________________________________________________________ GABRIELLE DERUSSY (mailto:gderussy@;techtarget.com) >> Sponsor this or any other TechTarget newsletter. _________________________________________________________________ :::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::: Published by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002 TechTarget. All rights reserved. If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://search400.techtarget.com/register and adjust your subscriptions accordingly.If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
