================================================================== SEARCH400.COM | Security Tip Aug. 12, 2003 ================================================================== FROM OUR SPONSORS:
Get the Facts. Get Protected. Get StandGuard Anti-Virus. http://search400.com/r/0,,16956,00.htm?bytware SkyView Partners -- Security consulting from the finest... http://www.skyviewpartners.com ================================================================== Essential explanations and tools to help secure the iSeries. More tips: http://search400.techtarget.com/tipsIndex/0,289482,sid3_tax2f8,00.html ================================================================== In today's technical advice roundup you'll find tips, expert answers and input from your peers to the following iSeries security questions and concerns: Today's Featured Security Tip: -- The adopted authority problem Answers to Other Technical Questions: - How does adopted authority work? - Implications of giving a user *SAVSYS special authority - Attention key drops the adopted authority - The danger of indiscriminately assigning special authorities Important Announcements and Links - Live webcast: Expanded output functions for the iSeries - Tips Contest: Win an Electronic Crossword Challenger II - Free on Search400.com: White Papers on iSeries security ___________________________________________________________________ ************************ SPONSORED BY Bytware, Inc. *************** Viruses on the iSeries? This is not the AS/400 of the '80s and '90s, it's the iSeries of the 21st century. Be sure that your security measures are appropriate for the time. Get the Facts. Get Protected. Get StandGuard Anti-Virus. http://search400.com/r/0,,16956,00.htm?bytware =================================================================== Today's Featured Tip =================================================================== The adopted authority problem by Rich Loeber Objects, such as programs, on your iSeries can adopt authority from owners, from users, from other programs or even other systems. Is this a problem? It can be. It would be in your best interest to understand what programs have authority to bestow on those to whom the it should not be granted. >> CLICK here for the full tip: http://www.search400.com/tip/1,289483,sid3_gci918560,00.html =================================================================== Answers to Other Security Questions =================================================================== HOW DOES ADOPTED AUTHORITY WORK? One user writes, "We don't want to give the *secadm to any user profiles, but still we need some user ID's other than Qsecofr to enable the user ID's. How does adopted authority work in this matter?" Search400.com security expert Carol Woodbury explains. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid458586_tax288767,00.html IMPLICATIONS OF GIVING A USER *SAVSYS SPECIAL AUTHORITY Systems management expert Ken Graap explains the possible implications of giving a user *SAVSYS special authority to backup other user's files. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid372945_tax285222,00.html ATTENTION KEY DROPS THE ADOPTED AUTHORITY Is it possible to set the security on the attention key menu to release the adopted authority, yet put it back when the F3 back to the application? Read what security expert Carol Woodbury had to say. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid517353_tax288767,00.html THE DANGER OF INDISCRIMINATELY ASSIGNING SPECIAL AUTHORITIES In this tip, security expert Dan Riehl explains the special authorities and points out the main exposures if they are not assigned judiciously. http://www.search400.com/tip/1,289483,sid3_gci865077,00.html ___________________________________________________________________ ********************** SPONSORED BY SkyView Partners ************** as-sess-ment \a-'ses-ment\ n. 1: the act or instance of assessing or appraisal. Combine 'security' with 'assessment' and you have the act or instance of appraising a company's security. At SkyView Partners we don't let our consulting end with an assessment. Led by Carol Woodbury, former OS/400 chief security architect for IBM, our team looks at your top 5 security risks, explains why you should be concerned and provides you with a plan to address your need. That's where security changes to action...with a plan. Visit http://www.skyviewpartners.com and tell us how we can help you. ________________________________________________________________ :::::::: DON'T MISS THESE IMPORTANT MESSAGES AND LINKS :::::::: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= LIVE WEBCAST | Expanded output functions for the iSeries Who: Bill Shaffer, iSeries Product Manager, Printing and E-output, IBM When: Tuesday, Aug. 19 at 2 p.m. EDT (18:00 GMT) Print functions for the iSeries are getting even better. New capabilities are being added to iSeries e-Output through Infoprint Server enhancements. These enhancements will extend the PDF and electronic output options you have with iSeries applications, particularly using a new set of functions called Intelligent Routing. Learn more about those enhancements, as well as additions to Infoprint Designer, from IBM's iSeries printing guru Bill Shaffer. >> PRE-REGISTER today: http://webevents.broadcast.com/techtarget/s400/071503/index.asp?loc=01 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- WIN A ELECTRONIC CROSSWORD CHALLENGER II | Tip contest Do you have a time-saving tip or trick that makes your day a little easier? Why not send it in and take a chance at winning an awesome prize. This month we're giving away an Electronic Crossword Challenger II. One million crossword puzzles in the palm of your hand...plus clues in case you need help! >> SUBMIT a Tip: http://search400.techtarget.com/tipsSubmit/1,289485,sid3,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- WHITE PAPERS ON ISERIES SECURITY |Free on Search400.com When it comes to securing your iSeries, the more advice and help you have the better. Browse Search400.com's white paper section to find informative white papers on security and several other iSeries topics. >> CLICK here to view the white papers: http://search400.techtarget.com/whitepapersByCategory/0,293837,sid3_tax292513_idx0_off10,00.html ________________________________________________________________ :::::::::::::::::::::: SEARCH400 CONTACTS ::::::::::::::::::: TIP MAILBOX, (mailto:[EMAIL PROTECTED]) >> Send us feedback on tips and ideas for new tip content. ________________________________________________________________ MICHELLE DAVIDSON, Site Editor (mailto:[EMAIL PROTECTED]) >> Send us your story ideas and best practices. ________________________________________________________________ DEBRA TART, Assistant Editor (mailto:[EMAIL PROTECTED]) >> Send us your tips and Best Web Links. ________________________________________________________________ DAVID GABEL, Executive Tech Editor (mailto:[EMAIL PROTECTED]) >> Send me your technical tips and tip ideas. ________________________________________________________________ JILLIAN CORBY, sales representative (mailto:[EMAIL PROTECTED]) >> Sponsor this or any other TechTarget newsletter. ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com Copyright 2003 TechTarget. All rights reserved. If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://search400.techtarget.com/register and adjust your subscriptions accordingly.If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
