![]() |
![]() |
![]() |
![]()
IN THIS ISSUE:
Password levels -- What's right for you?
Changing the password level
Four tools for controlling user profiles
Using QSYRUPWD to retrieve encrypted passwords
20 ways to improve your system's security
Webcast Premiere -- Government regulations: How do they affect your security strategy -- or do they?
![]()
SPONSORED BY:
Search400.com Product and Vendor Guide
![]()
The Buyers guide is one of the most comprehensive directories of vendor and product information on the Web. It covers a wide range of areas for your research needs, including Application Dev, E-Commerce Solutions, Security and more. Simply search by topic, company name or keyword and you have access to complete vendor and important product information without having to comb through multiple sites.
![]()
Click Here!
|
![]()
Password levels -- What's right for you?
[Search400.com]
by Rich Loeber
Since the introduction of OS/400 V5R1, a new system value for "Password Level" has been available (QPWDLVL). This new value lets you have additional control over the kinds of passwords you use on your system and how the system treats them. Using the new features provided through this new value, you can implement passwords of up to 128 characters in length.
But why would anyone want a password that long? Here are some reasons.
Changing the password level
[Search400.com]
A user wanted to change password level (QPWDLVL) from level 0 to level 2, but he wasn't sure of the best way to do this. Security expert Carol Woodbury was on hand with some advice.
Four tools for controlling user profiles
[Search400.com]
Even if you put procedures in place to control the users who are coming and going in your organization, chances are something will go wrong. How can you tell if all your profiles are what you want them to be? This tip discusses four command line tools that will give you as much information as you can digest about the security situation on your iSeries.
Using QSYRUPWD to retrieve encrypted passwords
[Search400.com]
A user asked, "How do I use APIs to retrieve encrypted passwords using ILE C. Is there any documentation on this?" Site expert John Brandt helped him out.
20 ways to improve your system's security
[Search400.com]
Is your system as secure as it can be? If you think it can be better, check out these hot expert Q&As.
![]()
WEBCASTS: Webcast Premiere -- Government regulations: How do they affect your security strategy -- or do they?
When: Friday, May 28 at 9 a.m. EDT (14:00 GMT)
Speaker: Carol Woodbury, president, CEO, SkyView Partners
Much has been written about government regulations and acts such as HIPAA, Sarbanes-Oxley and GLBA and whether they affect your security strategy. Carol Woodbury sets the record straight in this webcast.
She will discuss various government regulations and their implications to a security strategy. Specific OS/400 issues and resolutions will be discussed.
Download the slides from Carol's presentation.
TOPICS: New Book Excerpt: The Modern RPG IV Language, Third Edition
Log on and download for free Chapter 6 of The Modern RPG IV Language, Third Edition written by Bob Cozzi and published by MC Press.
This chapter, "Program Organization," focuses on source file location, source file member contents, module definition, static and automatic storage and more.
Win a copy of the book: After you read the chapter, test how much you've learned and then send us the results for a chance to win a copy of The Modern RPG IV Language, Third Edition.
TOPICS: User poll -- IBM's new pricing model
What do you think of IBM's new pricing model, which significantly lowers the price of many models of iSeries, including the new i5?
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
|
![]() |
|
![]() |
|