================================================================== SEARCH400.COM | Security Tip March 23, 2004 ================================================================== FROM OUR SPONSORS:
Someone Else's Problem? http://search400.com/r/0,,26771,00.htm?track=NL-236&ad=478697&bytware ================================================================== Essential explanations and tools to help secure the iSeries. More tips: http://search400.techtarget.com/tipsIndex/0,289482,sid3_tax292117_alpD_idx0,00.html?track=NL-236&ad=478697 ================================================================== In today's technical advice roundup you'll find tips, expert answers and input from your peers to the following iSeries security questions and concerns: Today's Featured Security Tip: -- Getting control over adopted authorities Answers to Other Technical Questions: - The adopted authority problem - Implications of giving a user *SAVSYS special authority - How does adopted authority work? - Tightening iSeries security Important Announcements and Links - Expert Profile: Carol Woodbury, Search400.com security expert - Tip Contest: Win a Logitech MX700 cordless optical mouse - Current Poll: IBM's pricing strategy - Free on Search400.com: White Papers on iSeries security __________________________________________________________________ *********************** SPONSORED BY Bytware, Inc. *************** Think virus outbreaks are someone else's problem? Think again. Many were surprised to learn that Mydoom was uncovered on the iSeries, but StandGuard Anti-Virus users were able to clean it right off. Could it still be sitting on your system? Get protected with StandGuard Anti-Virus, the "Product of the Year" in the Security category of the Search400.com 2003 Products of the Year awards. http://search400.com/r/0,,26771,00.htm?track=NL-236&ad=478697&bytware =================================================================== Today's Featured Tip =================================================================== Getting control over adopted authorities by Rich Loeber For security reasons, OS/400 programs have a setting that, when compiled, controls the user profile that will be used when that program runs. You may think your security configuration is all set and that you've made a final determination as to which users are allowed to access what objects on your system, but if a program on your system is compiled with the USRPRF attribute set to *OWNER, then all your preparation work may be out the window. >> CLICK here for the full tip: http://www.search400.com/tip/1,289483,sid3_gci956078,00.html?track=NL-236&ad=478697 =================================================================== Answers to Other Security Questions =================================================================== THE ADOPTED AUTHORITY PROBLEM Objects on your iSeries, such as programs, can adopt authority from owners, users, other programs or even other systems. Is that a problem? It can be. http://www.search400.com/tip/1,289483,sid3_gci918560,00.html?track=NL-236&ad=478697 IMPLICATIONS OF GIVING A USER *SAVSYS SPECIAL AUTHORITY Systems management expert Ken Graap explains the possible implications of giving a user *SAVSYS special authority to backup other user's files. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid372945_tax285222,00.html?track=NL-236&ad=478697 HOW DOES ADOPTED AUTHORITY WORK? One user writes, "We don't want to give the *SECADM to any user profiles, but still we need some user ID's other than QSECOFR to enable the user ID's. How does adopted authority work in this matter?" Search400.com security expert Carol Woodbury explains. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid458586_tax288767,00.html?track=NL-236&ad=478697 TIGHTENING ISERIES SECURITY As your company grows, so do the security risks -- from inside and outside threats. Be aware of what's lurking around the corner. Our resources can help you to protect your shop. http://search400.techtarget.com/featuredTopic/0,290042,sid3_gci928924,00.html?track=NL-236&ad=478697 ___________________________________________________________________ :::::::::: DON'T MISS THESE IMPORTANT MESSAGES AND LINKS ::::::::: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= EXPERT PROFILE | Carol Woodbury, Search400.com security expert Carol Woodbury is co-founder and president of SkyView Partners, a firm specializing in security consulting and assessments as well as the assessment product, SkyView Risk Assessor for OS/400. Carol has over 14 years in the security industry, 10 of those working for IBM's Enterprise Server Group as the AS/400 Security Architect and Chief Engineering Manager of Security Technology. Carol co-authored the popular book, Implementing AS/400 Security. Look for Carol's second book, Experts' Guide to OS/400 Security, to be released in the Spring of 2004. Let Carol's experience work for you. Ask Carol Security-related questions anytime. >> CLICK here to ask Carol a question or to read recent Q&As: http://Search400.techtarget.com/ateQuestion/0,289624,sid3_cid423497_tax288767,00.html?track=NL-236&ad=478697 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WIN A LOGITECH MX700 CORDLESS MOUSE | Search400.com tips contest We're giving away a Logitech MX700 cordless optical mouse. This awesome mouse will be awarded for the best tip submitted February through March. The fast RF cordless technology works within a six-foot range, has a rapid-charge base station and cruise control scrolling system for scrolling long documents or Web sites. Submit your tip today and become eligible to win. >> SUBMIT a Tip: http://search400.techtarget.com/tipsSubmit/0,289485,sid3,00.html?track=NL-236&ad=478697 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TAKE OUR POLL | Search400.com Reader Survey Do you believe IBM's pricing strategy for the iSeries is luring users to the platform or driving them away? >> CAST your vote: http://search400.techtarget.com/?track=NL-236&ad=478697#poll =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- WHITE PAPERS ON ISERIES SECURITY | Free on Search400.com When it comes to securing your iSeries, the more advice and help you have the better. Browse Search400.com's white paper section to find informative white papers on security and several other iSeries topics. >> CLICK here to view the white papers: http://search400.techtarget.com/whitepapersByCategory/0,293837,sid3_tax292513_idx0_off10,00.html?track=NL-236&ad=478697 ________________________________________________________________ :::::::::::::::::::::: SEARCH400 CONTACTS ::::::::::::::::::: TIP MAILBOX, (mailto:[EMAIL PROTECTED]) >> Send us feedback on tips and ideas for new tip content. ________________________________________________________________ MICHELLE DAVIDSON, editor (mailto:[EMAIL PROTECTED]) >> Send us your story ideas and best practices. ________________________________________________________________ DEBRA TART, assistant editor (mailto:[EMAIL PROTECTED]) >> Send us your tips and Best Web Links. ________________________________________________________________ GABRIELLE DERUSSY, director of site sales (mailto:[EMAIL PROTECTED]) >> Sponsor this or any other TechTarget newsletter. ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by Search400.com, a targeted Web site from TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Security Tip": Go to unsubscribe: http://Search400.com/u?cid=478697&lid=460581&track=NL-236&ad=478697 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: Search400 Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
